Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-40103 (GCVE-0-2025-40103)
Vulnerability from cvelistv5 – Published: 2025-10-30 09:48 – Updated: 2025-12-01 06:18| Vendor | Product | Version | ||
|---|---|---|---|---|
| Linux | Linux |
Affected:
8ceb984379462f94bdebef3288d569c6e1f912ea , < 790282abe9d805f08618c1c24ea2529e7259b692
(git)
Affected: 8ceb984379462f94bdebef3288d569c6e1f912ea , < d7dd034c14928306db1b46be277ae439b84dacf9 (git) Affected: 8ceb984379462f94bdebef3288d569c6e1f912ea , < e15605b68b490186da2ad8029c0351a9cfb0b9af (git) Affected: 8ceb984379462f94bdebef3288d569c6e1f912ea , < 896bb31e1416f582503db1350cf1bd10dc64e5a6 (git) Affected: 8ceb984379462f94bdebef3288d569c6e1f912ea , < c2b77f42205ef485a647f62082c442c1cd69d3fc (git) |
||
{
"containers": {
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Linux",
"programFiles": [
"fs/smb/client/inode.c",
"fs/smb/client/smb2ops.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"lessThan": "790282abe9d805f08618c1c24ea2529e7259b692",
"status": "affected",
"version": "8ceb984379462f94bdebef3288d569c6e1f912ea",
"versionType": "git"
},
{
"lessThan": "d7dd034c14928306db1b46be277ae439b84dacf9",
"status": "affected",
"version": "8ceb984379462f94bdebef3288d569c6e1f912ea",
"versionType": "git"
},
{
"lessThan": "e15605b68b490186da2ad8029c0351a9cfb0b9af",
"status": "affected",
"version": "8ceb984379462f94bdebef3288d569c6e1f912ea",
"versionType": "git"
},
{
"lessThan": "896bb31e1416f582503db1350cf1bd10dc64e5a6",
"status": "affected",
"version": "8ceb984379462f94bdebef3288d569c6e1f912ea",
"versionType": "git"
},
{
"lessThan": "c2b77f42205ef485a647f62082c442c1cd69d3fc",
"status": "affected",
"version": "8ceb984379462f94bdebef3288d569c6e1f912ea",
"versionType": "git"
}
]
},
{
"defaultStatus": "affected",
"product": "Linux",
"programFiles": [
"fs/smb/client/inode.c",
"fs/smb/client/smb2ops.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"status": "affected",
"version": "3.7"
},
{
"lessThan": "3.7",
"status": "unaffected",
"version": "0",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.1.*",
"status": "unaffected",
"version": "6.1.158",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.6.*",
"status": "unaffected",
"version": "6.6.114",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.12.*",
"status": "unaffected",
"version": "6.12.55",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.17.*",
"status": "unaffected",
"version": "6.17.5",
"versionType": "semver"
},
{
"lessThanOrEqual": "*",
"status": "unaffected",
"version": "6.18",
"versionType": "original_commit_for_fix"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.1.158",
"versionStartIncluding": "3.7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.6.114",
"versionStartIncluding": "3.7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.12.55",
"versionStartIncluding": "3.7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.17.5",
"versionStartIncluding": "3.7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.18",
"versionStartIncluding": "3.7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: Fix refcount leak for cifs_sb_tlink\n\nFix three refcount inconsistency issues related to `cifs_sb_tlink`.\n\nComments for `cifs_sb_tlink` state that `cifs_put_tlink()` needs to be\ncalled after successful calls to `cifs_sb_tlink()`. Three calls fail to\nupdate refcount accordingly, leading to possible resource leaks."
}
],
"providerMetadata": {
"dateUpdated": "2025-12-01T06:18:06.031Z",
"orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"shortName": "Linux"
},
"references": [
{
"url": "https://git.kernel.org/stable/c/790282abe9d805f08618c1c24ea2529e7259b692"
},
{
"url": "https://git.kernel.org/stable/c/d7dd034c14928306db1b46be277ae439b84dacf9"
},
{
"url": "https://git.kernel.org/stable/c/e15605b68b490186da2ad8029c0351a9cfb0b9af"
},
{
"url": "https://git.kernel.org/stable/c/896bb31e1416f582503db1350cf1bd10dc64e5a6"
},
{
"url": "https://git.kernel.org/stable/c/c2b77f42205ef485a647f62082c442c1cd69d3fc"
}
],
"title": "smb: client: Fix refcount leak for cifs_sb_tlink",
"x_generator": {
"engine": "bippy-1.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"assignerShortName": "Linux",
"cveId": "CVE-2025-40103",
"datePublished": "2025-10-30T09:48:08.421Z",
"dateReserved": "2025-04-16T07:20:57.164Z",
"dateUpdated": "2025-12-01T06:18:06.031Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-40103\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-10-30T10:15:34.693\",\"lastModified\":\"2025-10-30T15:03:13.440\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nsmb: client: Fix refcount leak for cifs_sb_tlink\\n\\nFix three refcount inconsistency issues related to `cifs_sb_tlink`.\\n\\nComments for `cifs_sb_tlink` state that `cifs_put_tlink()` needs to be\\ncalled after successful calls to `cifs_sb_tlink()`. Three calls fail to\\nupdate refcount accordingly, leading to possible resource leaks.\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/790282abe9d805f08618c1c24ea2529e7259b692\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/896bb31e1416f582503db1350cf1bd10dc64e5a6\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/c2b77f42205ef485a647f62082c442c1cd69d3fc\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/d7dd034c14928306db1b46be277ae439b84dacf9\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/e15605b68b490186da2ad8029c0351a9cfb0b9af\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
}
}
CERTFR-2026-AVI-0227
Vulnerability from certfr_avis - Published: 2026-02-27 - Updated: 2026-02-27
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Certaines d'entre elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, une atteinte à l'intégrité des données et un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 20.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 24.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 25.10",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 14.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 22.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-40296",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40296"
},
{
"name": "CVE-2025-40225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40225"
},
{
"name": "CVE-2025-40166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40166"
},
{
"name": "CVE-2025-40273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40273"
},
{
"name": "CVE-2025-40064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40064"
},
{
"name": "CVE-2025-38490",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38490"
},
{
"name": "CVE-2025-37850",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37850"
},
{
"name": "CVE-2025-38485",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38485"
},
{
"name": "CVE-2025-22026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22026"
},
{
"name": "CVE-2025-38579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38579"
},
{
"name": "CVE-2025-68196",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68196"
},
{
"name": "CVE-2025-37761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37761"
},
{
"name": "CVE-2025-37865",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37865"
},
{
"name": "CVE-2025-38328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38328"
},
{
"name": "CVE-2025-40156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40156"
},
{
"name": "CVE-2025-38711",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38711"
},
{
"name": "CVE-2025-38487",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38487"
},
{
"name": "CVE-2025-40137",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40137"
},
{
"name": "CVE-2025-37775",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37775"
},
{
"name": "CVE-2025-38335",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38335"
},
{
"name": "CVE-2025-38304",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38304"
},
{
"name": "CVE-2025-37892",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37892"
},
{
"name": "CVE-2025-38100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38100"
},
{
"name": "CVE-2025-37859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37859"
},
{
"name": "CVE-2025-40002",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40002"
},
{
"name": "CVE-2025-40057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40057"
},
{
"name": "CVE-2025-38043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38043"
},
{
"name": "CVE-2025-38471",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38471"
},
{
"name": "CVE-2025-38520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38520"
},
{
"name": "CVE-2025-37792",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37792"
},
{
"name": "CVE-2025-68240",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68240"
},
{
"name": "CVE-2025-38108",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38108"
},
{
"name": "CVE-2025-38230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38230"
},
{
"name": "CVE-2025-38229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38229"
},
{
"name": "CVE-2025-40055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40055"
},
{
"name": "CVE-2025-38158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38158"
},
{
"name": "CVE-2025-37872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37872"
},
{
"name": "CVE-2025-38588",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38588"
},
{
"name": "CVE-2025-40314",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40314"
},
{
"name": "CVE-2025-40029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40029"
},
{
"name": "CVE-2025-40037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40037"
},
{
"name": "CVE-2025-38279",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38279"
},
{
"name": "CVE-2025-38561",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38561"
},
{
"name": "CVE-2025-38574",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38574"
},
{
"name": "CVE-2025-40306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40306"
},
{
"name": "CVE-2025-68210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68210"
},
{
"name": "CVE-2025-40239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40239"
},
{
"name": "CVE-2025-40147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40147"
},
{
"name": "CVE-2025-40048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40048"
},
{
"name": "CVE-2025-38147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38147"
},
{
"name": "CVE-2025-23155",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23155"
},
{
"name": "CVE-2025-38286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38286"
},
{
"name": "CVE-2025-40219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40219"
},
{
"name": "CVE-2025-39757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39757"
},
{
"name": "CVE-2025-68200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68200"
},
{
"name": "CVE-2025-38501",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38501"
},
{
"name": "CVE-2025-38474",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38474"
},
{
"name": "CVE-2025-37979",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37979"
},
{
"name": "CVE-2025-40043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40043"
},
{
"name": "CVE-2025-68176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68176"
},
{
"name": "CVE-2025-37777",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37777"
},
{
"name": "CVE-2025-39772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39772"
},
{
"name": "CVE-2025-68199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68199"
},
{
"name": "CVE-2025-37936",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37936"
},
{
"name": "CVE-2025-68204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68204"
},
{
"name": "CVE-2025-38601",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38601"
},
{
"name": "CVE-2025-37766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37766"
},
{
"name": "CVE-2025-38104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38104"
},
{
"name": "CVE-2025-37844",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37844"
},
{
"name": "CVE-2025-21931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21931"
},
{
"name": "CVE-2025-37871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37871"
},
{
"name": "CVE-2025-37778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37778"
},
{
"name": "CVE-2025-39716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39716"
},
{
"name": "CVE-2025-39702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39702"
},
{
"name": "CVE-2025-38515",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38515"
},
{
"name": "CVE-2025-38645",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38645"
},
{
"name": "CVE-2025-38163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38163"
},
{
"name": "CVE-2025-22126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22126"
},
{
"name": "CVE-2025-38444",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38444"
},
{
"name": "CVE-2025-38109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38109"
},
{
"name": "CVE-2025-39779",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39779"
},
{
"name": "CVE-2025-37755",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37755"
},
{
"name": "CVE-2025-39685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39685"
},
{
"name": "CVE-2025-38660",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38660"
},
{
"name": "CVE-2025-39761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39761"
},
{
"name": "CVE-2025-68246",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68246"
},
{
"name": "CVE-2025-40287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40287"
},
{
"name": "CVE-2025-39720",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39720"
},
{
"name": "CVE-2025-38624",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38624"
},
{
"name": "CVE-2025-40100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40100"
},
{
"name": "CVE-2025-40285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40285"
},
{
"name": "CVE-2025-38388",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38388"
},
{
"name": "CVE-2025-38157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38157"
},
{
"name": "CVE-2025-40063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40063"
},
{
"name": "CVE-2025-37790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37790"
},
{
"name": "CVE-2025-40208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40208"
},
{
"name": "CVE-2025-39746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39746"
},
{
"name": "CVE-2025-38323",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38323"
},
{
"name": "CVE-2025-40019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40019"
},
{
"name": "CVE-2025-40039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40039"
},
{
"name": "CVE-2025-38208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38208"
},
{
"name": "CVE-2025-40240",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40240"
},
{
"name": "CVE-2025-38219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38219"
},
{
"name": "CVE-2025-39889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39889"
},
{
"name": "CVE-2025-38099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38099"
},
{
"name": "CVE-2025-38524",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38524"
},
{
"name": "CVE-2025-38466",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38466"
},
{
"name": "CVE-2025-40117",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40117"
},
{
"name": "CVE-2025-37758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37758"
},
{
"name": "CVE-2025-40081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40081"
},
{
"name": "CVE-2025-38087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38087"
},
{
"name": "CVE-2025-38039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38039"
},
{
"name": "CVE-2025-40153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40153"
},
{
"name": "CVE-2025-40103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40103"
},
{
"name": "CVE-2025-40294",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40294"
},
{
"name": "CVE-2025-38595",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38595"
},
{
"name": "CVE-2025-38626",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38626"
},
{
"name": "CVE-2025-40356",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40356"
},
{
"name": "CVE-2025-40121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40121"
},
{
"name": "CVE-2025-40312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40312"
},
{
"name": "CVE-2025-40204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40204"
},
{
"name": "CVE-2025-37852",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37852"
},
{
"name": "CVE-2025-37841",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37841"
},
{
"name": "CVE-2025-40171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40171"
},
{
"name": "CVE-2025-37918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37918"
},
{
"name": "CVE-2025-37917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37917"
},
{
"name": "CVE-2025-38290",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38290"
},
{
"name": "CVE-2025-68243",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68243"
},
{
"name": "CVE-2025-38063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38063"
},
{
"name": "CVE-2025-37770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37770"
},
{
"name": "CVE-2025-37773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37773"
},
{
"name": "CVE-2025-68175",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68175"
},
{
"name": "CVE-2025-40221",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40221"
},
{
"name": "CVE-2025-38578",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38578"
},
{
"name": "CVE-2025-40139",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40139"
},
{
"name": "CVE-2025-40056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40056"
},
{
"name": "CVE-2025-38675",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38675"
},
{
"name": "CVE-2025-38646",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38646"
},
{
"name": "CVE-2025-38491",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38491"
},
{
"name": "CVE-2025-38708",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38708"
},
{
"name": "CVE-2025-37961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37961"
},
{
"name": "CVE-2025-68248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68248"
},
{
"name": "CVE-2025-40125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40125"
},
{
"name": "CVE-2025-40350",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40350"
},
{
"name": "CVE-2025-40309",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40309"
},
{
"name": "CVE-2025-38313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38313"
},
{
"name": "CVE-2025-38336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38336"
},
{
"name": "CVE-2025-40349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40349"
},
{
"name": "CVE-2025-40052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40052"
},
{
"name": "CVE-2025-38408",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38408"
},
{
"name": "CVE-2025-40343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40343"
},
{
"name": "CVE-2025-38644",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38644"
},
{
"name": "CVE-2025-38692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38692"
},
{
"name": "CVE-2025-38061",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38061"
},
{
"name": "CVE-2025-68173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68173"
},
{
"name": "CVE-2025-37983",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37983"
},
{
"name": "CVE-2025-38127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38127"
},
{
"name": "CVE-2025-38375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38375"
},
{
"name": "CVE-2025-37784",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37784"
},
{
"name": "CVE-2025-39701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39701"
},
{
"name": "CVE-2025-40308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40308"
},
{
"name": "CVE-2025-40187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40187"
},
{
"name": "CVE-2025-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37920"
},
{
"name": "CVE-2025-40315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40315"
},
{
"name": "CVE-2025-37815",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37815"
},
{
"name": "CVE-2025-38686",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38686"
},
{
"name": "CVE-2025-37819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37819"
},
{
"name": "CVE-2025-40092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40092"
},
{
"name": "CVE-2025-40298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40298"
},
{
"name": "CVE-2025-40355",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40355"
},
{
"name": "CVE-2025-38609",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38609"
},
{
"name": "CVE-2025-68186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68186"
},
{
"name": "CVE-2025-40054",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40054"
},
{
"name": "CVE-2025-68184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68184"
},
{
"name": "CVE-2024-36357",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36357"
},
{
"name": "CVE-2025-38463",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38463"
},
{
"name": "CVE-2025-40115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40115"
},
{
"name": "CVE-2025-38112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38112"
},
{
"name": "CVE-2025-38521",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38521"
},
{
"name": "CVE-2025-38023",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38023"
},
{
"name": "CVE-2025-39709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39709"
},
{
"name": "CVE-2025-38282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38282"
},
{
"name": "CVE-2025-39689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39689"
},
{
"name": "CVE-2025-38215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38215"
},
{
"name": "CVE-2025-39787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39787"
},
{
"name": "CVE-2025-37943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37943"
},
{
"name": "CVE-2025-37745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37745"
},
{
"name": "CVE-2025-40058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40058"
},
{
"name": "CVE-2025-39731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39731"
},
{
"name": "CVE-2025-38734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38734"
},
{
"name": "CVE-2025-38653",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38653"
},
{
"name": "CVE-2025-38571",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38571"
},
{
"name": "CVE-2025-37789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37789"
},
{
"name": "CVE-2025-40347",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40347"
},
{
"name": "CVE-2025-38695",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38695"
},
{
"name": "CVE-2025-38004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38004"
},
{
"name": "CVE-2025-39749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39749"
},
{
"name": "CVE-2025-40198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40198"
},
{
"name": "CVE-2025-68310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68310"
},
{
"name": "CVE-2025-68179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68179"
},
{
"name": "CVE-2025-40145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40145"
},
{
"name": "CVE-2025-38387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38387"
},
{
"name": "CVE-2025-68169",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68169"
},
{
"name": "CVE-2025-38362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38362"
},
{
"name": "CVE-2025-40173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40173"
},
{
"name": "CVE-2025-68316",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68316"
},
{
"name": "CVE-2025-68321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68321"
},
{
"name": "CVE-2025-37924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37924"
},
{
"name": "CVE-2025-40004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40004"
},
{
"name": "CVE-2025-38371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38371"
},
{
"name": "CVE-2025-38445",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38445"
},
{
"name": "CVE-2025-38456",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38456"
},
{
"name": "CVE-2025-38538",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38538"
},
{
"name": "CVE-2025-37867",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37867"
},
{
"name": "CVE-2025-23160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23160"
},
{
"name": "CVE-2025-40311",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40311"
},
{
"name": "CVE-2025-38295",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38295"
},
{
"name": "CVE-2025-38461",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38461"
},
{
"name": "CVE-2025-37857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37857"
},
{
"name": "CVE-2025-37842",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37842"
},
{
"name": "CVE-2025-40237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40237"
},
{
"name": "CVE-2025-38710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38710"
},
{
"name": "CVE-2025-39681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39681"
},
{
"name": "CVE-2025-38060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38060"
},
{
"name": "CVE-2025-40167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40167"
},
{
"name": "CVE-2025-38159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38159"
},
{
"name": "CVE-2025-38066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38066"
},
{
"name": "CVE-2025-39770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39770"
},
{
"name": "CVE-2025-37744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37744"
},
{
"name": "CVE-2025-38705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38705"
},
{
"name": "CVE-2025-40194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40194"
},
{
"name": "CVE-2025-38706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38706"
},
{
"name": "CVE-2025-40333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40333"
},
{
"name": "CVE-2025-38305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38305"
},
{
"name": "CVE-2025-37884",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37884"
},
{
"name": "CVE-2025-38067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38067"
},
{
"name": "CVE-2025-39750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39750"
},
{
"name": "CVE-2025-38699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38699"
},
{
"name": "CVE-2025-37927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37927"
},
{
"name": "CVE-2025-38707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38707"
},
{
"name": "CVE-2025-38562",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38562"
},
{
"name": "CVE-2025-37897",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37897"
},
{
"name": "CVE-2025-40256",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40256"
},
{
"name": "CVE-2025-37911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37911"
},
{
"name": "CVE-2025-40245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40245"
},
{
"name": "CVE-2025-38587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38587"
},
{
"name": "CVE-2025-37869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37869"
},
{
"name": "CVE-2025-39692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39692"
},
{
"name": "CVE-2025-40360",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40360"
},
{
"name": "CVE-2025-40332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40332"
},
{
"name": "CVE-2025-40082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40082"
},
{
"name": "CVE-2025-38068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38068"
},
{
"name": "CVE-2025-38436",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38436"
},
{
"name": "CVE-2025-37930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37930"
},
{
"name": "CVE-2025-40104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40104"
},
{
"name": "CVE-2025-38401",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38401"
},
{
"name": "CVE-2025-38677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38677"
},
{
"name": "CVE-2025-38097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38097"
},
{
"name": "CVE-2025-37810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37810"
},
{
"name": "CVE-2025-38253",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38253"
},
{
"name": "CVE-2025-40097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40097"
},
{
"name": "CVE-2025-38123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38123"
},
{
"name": "CVE-2025-38338",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38338"
},
{
"name": "CVE-2025-38555",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38555"
},
{
"name": "CVE-2025-38239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38239"
},
{
"name": "CVE-2025-40001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40001"
},
{
"name": "CVE-2025-38590",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38590"
},
{
"name": "CVE-2025-38027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38027"
},
{
"name": "CVE-2025-38102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38102"
},
{
"name": "CVE-2025-40035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40035"
},
{
"name": "CVE-2025-68187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68187"
},
{
"name": "CVE-2025-38283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38283"
},
{
"name": "CVE-2025-40322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40322"
},
{
"name": "CVE-2025-68209",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68209"
},
{
"name": "CVE-2025-40045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40045"
},
{
"name": "CVE-2025-23159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23159"
},
{
"name": "CVE-2025-38455",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38455"
},
{
"name": "CVE-2025-40313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40313"
},
{
"name": "CVE-2025-40089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40089"
},
{
"name": "CVE-2025-38584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38584"
},
{
"name": "CVE-2025-38015",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38015"
},
{
"name": "CVE-2025-39675",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39675"
},
{
"name": "CVE-2025-39679",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39679"
},
{
"name": "CVE-2025-38527",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38527"
},
{
"name": "CVE-2025-38449",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38449"
},
{
"name": "CVE-2025-40233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40233"
},
{
"name": "CVE-2025-40172",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40172"
},
{
"name": "CVE-2025-37853",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37853"
},
{
"name": "CVE-2025-38126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38126"
},
{
"name": "CVE-2025-38149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38149"
},
{
"name": "CVE-2025-39763",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39763"
},
{
"name": "CVE-2025-38399",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38399"
},
{
"name": "CVE-2025-38065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38065"
},
{
"name": "CVE-2025-38693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38693"
},
{
"name": "CVE-2025-38679",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38679"
},
{
"name": "CVE-2025-38459",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38459"
},
{
"name": "CVE-2025-40188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40188"
},
{
"name": "CVE-2025-40271",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40271"
},
{
"name": "CVE-2025-40291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40291"
},
{
"name": "CVE-2025-38685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38685"
},
{
"name": "CVE-2025-40359",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40359"
},
{
"name": "CVE-2025-38412",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38412"
},
{
"name": "CVE-2025-38031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38031"
},
{
"name": "CVE-2025-40186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40186"
},
{
"name": "CVE-2025-38293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38293"
},
{
"name": "CVE-2025-40073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40073"
},
{
"name": "CVE-2025-38648",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38648"
},
{
"name": "CVE-2025-38278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38278"
},
{
"name": "CVE-2025-37764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37764"
},
{
"name": "CVE-2025-38184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38184"
},
{
"name": "CVE-2025-37741",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37741"
},
{
"name": "CVE-2025-38053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38053"
},
{
"name": "CVE-2025-40242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40242"
},
{
"name": "CVE-2025-37822",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37822"
},
{
"name": "CVE-2025-37912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37912"
},
{
"name": "CVE-2025-38482",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38482"
},
{
"name": "CVE-2025-37820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37820"
},
{
"name": "CVE-2025-68198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68198"
},
{
"name": "CVE-2025-37985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37985"
},
{
"name": "CVE-2025-68314",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68314"
},
{
"name": "CVE-2025-38634",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38634"
},
{
"name": "CVE-2025-40212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40212"
},
{
"name": "CVE-2025-37787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37787"
},
{
"name": "CVE-2025-38008",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38008"
},
{
"name": "CVE-2025-38458",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38458"
},
{
"name": "CVE-2025-39730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39730"
},
{
"name": "CVE-2025-38011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38011"
},
{
"name": "CVE-2025-68190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68190"
},
{
"name": "CVE-2025-38034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38034"
},
{
"name": "CVE-2025-40086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40086"
},
{
"name": "CVE-2025-68242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68242"
},
{
"name": "CVE-2025-38135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38135"
},
{
"name": "CVE-2025-38619",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38619"
},
{
"name": "CVE-2025-40169",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40169"
},
{
"name": "CVE-2025-38312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38312"
},
{
"name": "CVE-2025-38095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38095"
},
{
"name": "CVE-2025-37878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37878"
},
{
"name": "CVE-2025-39737",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39737"
},
{
"name": "CVE-2025-38464",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38464"
},
{
"name": "CVE-2025-40049",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40049"
},
{
"name": "CVE-2025-68322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68322"
},
{
"name": "CVE-2025-38363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38363"
},
{
"name": "CVE-2025-38702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38702"
},
{
"name": "CVE-2025-38319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38319"
},
{
"name": "CVE-2025-40238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40238"
},
{
"name": "CVE-2025-38724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38724"
},
{
"name": "CVE-2025-68205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68205"
},
{
"name": "CVE-2025-40277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40277"
},
{
"name": "CVE-2025-40070",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40070"
},
{
"name": "CVE-2025-38250",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38250"
},
{
"name": "CVE-2025-38457",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38457"
},
{
"name": "CVE-2025-38582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38582"
},
{
"name": "CVE-2025-37813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37813"
},
{
"name": "CVE-2025-38543",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38543"
},
{
"name": "CVE-2025-38698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38698"
},
{
"name": "CVE-2025-38212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38212"
},
{
"name": "CVE-2025-40106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40106"
},
{
"name": "CVE-2025-68174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68174"
},
{
"name": "CVE-2025-38298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38298"
},
{
"name": "CVE-2025-40272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40272"
},
{
"name": "CVE-2025-39739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39739"
},
{
"name": "CVE-2025-38024",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38024"
},
{
"name": "CVE-2025-40047",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40047"
},
{
"name": "CVE-2025-38496",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38496"
},
{
"name": "CVE-2025-38078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38078"
},
{
"name": "CVE-2025-38419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38419"
},
{
"name": "CVE-2025-40136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40136"
},
{
"name": "CVE-2025-38533",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38533"
},
{
"name": "CVE-2025-40344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40344"
},
{
"name": "CVE-2025-40205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40205"
},
{
"name": "CVE-2025-40354",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40354"
},
{
"name": "CVE-2025-38169",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38169"
},
{
"name": "CVE-2025-37931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37931"
},
{
"name": "CVE-2025-38511",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38511"
},
{
"name": "CVE-2025-38537",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38537"
},
{
"name": "CVE-2025-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38546"
},
{
"name": "CVE-2025-38211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38211"
},
{
"name": "CVE-2025-40033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40033"
},
{
"name": "CVE-2025-38057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38057"
},
{
"name": "CVE-2025-40122",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40122"
},
{
"name": "CVE-2025-68188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68188"
},
{
"name": "CVE-2025-40269",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40269"
},
{
"name": "CVE-2025-37887",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37887"
},
{
"name": "CVE-2025-38077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38077"
},
{
"name": "CVE-2025-38251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38251"
},
{
"name": "CVE-2025-37861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37861"
},
{
"name": "CVE-2025-68319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68319"
},
{
"name": "CVE-2025-40119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40119"
},
{
"name": "CVE-2025-38120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38120"
},
{
"name": "CVE-2025-38285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38285"
},
{
"name": "CVE-2025-39743",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39743"
},
{
"name": "CVE-2025-39718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39718"
},
{
"name": "CVE-2025-37938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37938"
},
{
"name": "CVE-2025-38005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38005"
},
{
"name": "CVE-2025-38368",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38368"
},
{
"name": "CVE-2025-40075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40075"
},
{
"name": "CVE-2025-38161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38161"
},
{
"name": "CVE-2025-38331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38331"
},
{
"name": "CVE-2025-38354",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38354"
},
{
"name": "CVE-2025-40138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40138"
},
{
"name": "CVE-2025-38712",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38712"
},
{
"name": "CVE-2025-38732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38732"
},
{
"name": "CVE-2025-39773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39773"
},
{
"name": "CVE-2025-38696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38696"
},
{
"name": "CVE-2025-40143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40143"
},
{
"name": "CVE-2025-68189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68189"
},
{
"name": "CVE-2025-38274",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38274"
},
{
"name": "CVE-2025-40076",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40076"
},
{
"name": "CVE-2025-68180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68180"
},
{
"name": "CVE-2025-37874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37874"
},
{
"name": "CVE-2025-38115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38115"
},
{
"name": "CVE-2025-38632",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38632"
},
{
"name": "CVE-2025-37988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37988"
},
{
"name": "CVE-2025-23158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23158"
},
{
"name": "CVE-2025-21780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21780"
},
{
"name": "CVE-2025-23144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23144"
},
{
"name": "CVE-2025-38153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38153"
},
{
"name": "CVE-2025-37969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37969"
},
{
"name": "CVE-2025-38548",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38548"
},
{
"name": "CVE-2025-37816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37816"
},
{
"name": "CVE-2025-37899",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37899"
},
{
"name": "CVE-2025-40362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40362"
},
{
"name": "CVE-2025-37742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37742"
},
{
"name": "CVE-2025-68201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68201"
},
{
"name": "CVE-2025-40289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40289"
},
{
"name": "CVE-2025-37765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37765"
},
{
"name": "CVE-2025-38395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38395"
},
{
"name": "CVE-2025-37921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37921"
},
{
"name": "CVE-2025-38507",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38507"
},
{
"name": "CVE-2025-40230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40230"
},
{
"name": "CVE-2025-39989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39989"
},
{
"name": "CVE-2025-38337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38337"
},
{
"name": "CVE-2025-38014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38014"
},
{
"name": "CVE-2025-38258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38258"
},
{
"name": "CVE-2025-37828",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37828"
},
{
"name": "CVE-2025-37769",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37769"
},
{
"name": "CVE-2025-38465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38465"
},
{
"name": "CVE-2025-38513",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38513"
},
{
"name": "CVE-2025-40292",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40292"
},
{
"name": "CVE-2025-38086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38086"
},
{
"name": "CVE-2025-68181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68181"
},
{
"name": "CVE-2025-37935",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37935"
},
{
"name": "CVE-2025-40032",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40032"
},
{
"name": "CVE-2025-38396",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38396"
},
{
"name": "CVE-2025-23161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23161"
},
{
"name": "CVE-2025-38407",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38407"
},
{
"name": "CVE-2025-38493",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38493"
},
{
"name": "CVE-2025-37803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37803"
},
{
"name": "CVE-2025-40228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40228"
},
{
"name": "CVE-2025-40150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40150"
},
{
"name": "CVE-2025-38670",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38670"
},
{
"name": "CVE-2025-39732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39732"
},
{
"name": "CVE-2025-37824",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37824"
},
{
"name": "CVE-2025-40274",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40274"
},
{
"name": "CVE-2025-38602",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38602"
},
{
"name": "CVE-2025-38003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38003"
},
{
"name": "CVE-2025-38441",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38441"
},
{
"name": "CVE-2025-40206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40206"
},
{
"name": "CVE-2025-40218",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40218"
},
{
"name": "CVE-2025-38007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38007"
},
{
"name": "CVE-2025-37923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37923"
},
{
"name": "CVE-2025-40088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40088"
},
{
"name": "CVE-2025-40220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40220"
},
{
"name": "CVE-2025-38142",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38142"
},
{
"name": "CVE-2025-37739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37739"
},
{
"name": "CVE-2025-38478",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38478"
},
{
"name": "CVE-2025-38568",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38568"
},
{
"name": "CVE-2025-38583",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38583"
},
{
"name": "CVE-2025-39788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39788"
},
{
"name": "CVE-2025-37831",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37831"
},
{
"name": "CVE-2025-38499",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38499"
},
{
"name": "CVE-2025-68312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68312"
},
{
"name": "CVE-2025-40062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40062"
},
{
"name": "CVE-2025-68194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68194"
},
{
"name": "CVE-2025-38269",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38269"
},
{
"name": "CVE-2025-38079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38079"
},
{
"name": "CVE-2025-37940",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37940"
},
{
"name": "CVE-2025-40336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40336"
},
{
"name": "CVE-2025-37945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37945"
},
{
"name": "CVE-2025-40067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40067"
},
{
"name": "CVE-2025-40101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40101"
},
{
"name": "CVE-2025-38735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38735"
},
{
"name": "CVE-2025-68251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68251"
},
{
"name": "CVE-2025-38652",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38652"
},
{
"name": "CVE-2025-38110",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38110"
},
{
"name": "CVE-2025-38422",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38422"
},
{
"name": "CVE-2025-38402",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38402"
},
{
"name": "CVE-2025-39698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39698"
},
{
"name": "CVE-2025-40038",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40038"
},
{
"name": "CVE-2025-37915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37915"
},
{
"name": "CVE-2025-68183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68183"
},
{
"name": "CVE-2025-23146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23146"
},
{
"name": "CVE-2025-37903",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37903"
},
{
"name": "CVE-2025-40353",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40353"
},
{
"name": "CVE-2025-40222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40222"
},
{
"name": "CVE-2025-23142",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23142"
},
{
"name": "CVE-2025-37738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37738"
},
{
"name": "CVE-2025-38303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38303"
},
{
"name": "CVE-2025-38074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38074"
},
{
"name": "CVE-2025-40085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40085"
},
{
"name": "CVE-2025-38119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38119"
},
{
"name": "CVE-2025-38232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38232"
},
{
"name": "CVE-2025-38245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38245"
},
{
"name": "CVE-2025-40184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40184"
},
{
"name": "CVE-2025-68244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68244"
},
{
"name": "CVE-2025-40231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40231"
},
{
"name": "CVE-2025-38324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38324"
},
{
"name": "CVE-2025-40278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40278"
},
{
"name": "CVE-2025-38018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38018"
},
{
"name": "CVE-2025-40176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40176"
},
{
"name": "CVE-2025-40342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40342"
},
{
"name": "CVE-2025-37830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37830"
},
{
"name": "CVE-2025-38614",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38614"
},
{
"name": "CVE-2025-37991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37991"
},
{
"name": "CVE-2025-38425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38425"
},
{
"name": "CVE-2025-40210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40210"
},
{
"name": "CVE-2025-37978",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37978"
},
{
"name": "CVE-2025-37781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37781"
},
{
"name": "CVE-2025-38210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38210"
},
{
"name": "CVE-2025-38542",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38542"
},
{
"name": "CVE-2025-38664",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38664"
},
{
"name": "CVE-2025-38344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38344"
},
{
"name": "CVE-2025-23145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23145"
},
{
"name": "CVE-2025-38322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38322"
},
{
"name": "CVE-2025-38088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38088"
},
{
"name": "CVE-2025-23141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23141"
},
{
"name": "CVE-2025-40193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40193"
},
{
"name": "CVE-2025-37823",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37823"
},
{
"name": "CVE-2025-38332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38332"
},
{
"name": "CVE-2025-40148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40148"
},
{
"name": "CVE-2025-40326",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40326"
},
{
"name": "CVE-2025-38386",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38386"
},
{
"name": "CVE-2025-40279",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40279"
},
{
"name": "CVE-2025-38385",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38385"
},
{
"name": "CVE-2025-40201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40201"
},
{
"name": "CVE-2024-53217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53217"
},
{
"name": "CVE-2025-37952",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37952"
},
{
"name": "CVE-2025-38694",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38694"
},
{
"name": "CVE-2025-37793",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37793"
},
{
"name": "CVE-2025-40084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40084"
},
{
"name": "CVE-2025-68311",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68311"
},
{
"name": "CVE-2025-37740",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37740"
},
{
"name": "CVE-2025-38676",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38676"
},
{
"name": "CVE-2025-38530",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38530"
},
{
"name": "CVE-2025-38174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38174"
},
{
"name": "CVE-2025-37826",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37826"
},
{
"name": "CVE-2025-37986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37986"
},
{
"name": "CVE-2025-37829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37829"
},
{
"name": "CVE-2025-68320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68320"
},
{
"name": "CVE-2025-40341",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40341"
},
{
"name": "CVE-2025-38409",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38409"
},
{
"name": "CVE-2025-40199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40199"
},
{
"name": "CVE-2025-40183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40183"
},
{
"name": "CVE-2025-38019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38019"
},
{
"name": "CVE-2025-38729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38729"
},
{
"name": "CVE-2025-68172",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68172"
},
{
"name": "CVE-2025-23151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23151"
},
{
"name": "CVE-2025-38037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38037"
},
{
"name": "CVE-2025-40338",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40338"
},
{
"name": "CVE-2025-40195",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40195"
},
{
"name": "CVE-2025-37796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37796"
},
{
"name": "CVE-2025-37962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37962"
},
{
"name": "CVE-2025-40134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40134"
},
{
"name": "CVE-2025-38681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38681"
},
{
"name": "CVE-2025-37799",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37799"
},
{
"name": "CVE-2025-38593",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38593"
},
{
"name": "CVE-2025-38342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38342"
},
{
"name": "CVE-2025-39795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39795"
},
{
"name": "CVE-2025-37801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37801"
},
{
"name": "CVE-2025-38167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38167"
},
{
"name": "CVE-2025-37883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37883"
},
{
"name": "CVE-2025-40302",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40302"
},
{
"name": "CVE-2025-37863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37863"
},
{
"name": "CVE-2025-37901",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37901"
},
{
"name": "CVE-2025-38687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38687"
},
{
"name": "CVE-2025-40358",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40358"
},
{
"name": "CVE-2025-37811",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37811"
},
{
"name": "CVE-2025-40165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40165"
},
{
"name": "CVE-2025-38257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38257"
},
{
"name": "CVE-2025-68318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68318"
},
{
"name": "CVE-2025-37864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37864"
},
{
"name": "CVE-2025-38307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38307"
},
{
"name": "CVE-2025-40161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40161"
},
{
"name": "CVE-2025-40357",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40357"
},
{
"name": "CVE-2025-40328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40328"
},
{
"name": "CVE-2025-37916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37916"
},
{
"name": "CVE-2025-40340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40340"
},
{
"name": "CVE-2025-38111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38111"
},
{
"name": "CVE-2025-37767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37767"
},
{
"name": "CVE-2025-40283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40283"
},
{
"name": "CVE-2025-40324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40324"
},
{
"name": "CVE-2025-37989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37989"
},
{
"name": "CVE-2025-38529",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38529"
},
{
"name": "CVE-2025-40131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40131"
},
{
"name": "CVE-2025-40146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40146"
},
{
"name": "CVE-2025-38326",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38326"
},
{
"name": "CVE-2025-40177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40177"
},
{
"name": "CVE-2025-38055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38055"
},
{
"name": "CVE-2025-38129",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38129"
},
{
"name": "CVE-2025-38384",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38384"
},
{
"name": "CVE-2025-38334",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38334"
},
{
"name": "CVE-2025-38728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38728"
},
{
"name": "CVE-2025-38424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38424"
},
{
"name": "CVE-2025-38430",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38430"
},
{
"name": "CVE-2025-38715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38715"
},
{
"name": "CVE-2025-39734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39734"
},
{
"name": "CVE-2025-38089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38089"
},
{
"name": "CVE-2025-40226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40226"
},
{
"name": "CVE-2025-40078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40078"
},
{
"name": "CVE-2025-38382",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38382"
},
{
"name": "CVE-2025-40074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40074"
},
{
"name": "CVE-2025-38608",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38608"
},
{
"name": "CVE-2025-40321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40321"
},
{
"name": "CVE-2025-38650",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38650"
},
{
"name": "CVE-2025-40069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40069"
},
{
"name": "CVE-2025-39710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39710"
},
{
"name": "CVE-2025-40116",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40116"
},
{
"name": "CVE-2025-68249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68249"
},
{
"name": "CVE-2025-38124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38124"
},
{
"name": "CVE-2025-37925",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37925"
},
{
"name": "CVE-2025-40158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40158"
},
{
"name": "CVE-2025-39683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39683"
},
{
"name": "CVE-2025-38420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38420"
},
{
"name": "CVE-2025-38071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38071"
},
{
"name": "CVE-2025-40327",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40327"
},
{
"name": "CVE-2025-40130",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40130"
},
{
"name": "CVE-2025-40179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40179"
},
{
"name": "CVE-2025-37972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37972"
},
{
"name": "CVE-2025-38183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38183"
},
{
"name": "CVE-2025-40127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40127"
},
{
"name": "CVE-2025-37768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37768"
},
{
"name": "CVE-2025-40282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40282"
},
{
"name": "CVE-2025-39794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39794"
},
{
"name": "CVE-2025-38160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38160"
},
{
"name": "CVE-2025-37984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37984"
},
{
"name": "CVE-2025-38528",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38528"
},
{
"name": "CVE-2025-40168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40168"
},
{
"name": "CVE-2025-37856",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37856"
},
{
"name": "CVE-2025-38107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38107"
},
{
"name": "CVE-2025-38292",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38292"
},
{
"name": "CVE-2025-40053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40053"
},
{
"name": "CVE-2025-38085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38085"
},
{
"name": "CVE-2025-38222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38222"
},
{
"name": "CVE-2025-38010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38010"
},
{
"name": "CVE-2025-38197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38197"
},
{
"name": "CVE-2025-38468",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38468"
},
{
"name": "CVE-2025-40120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40120"
},
{
"name": "CVE-2025-40185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40185"
},
{
"name": "CVE-2025-38688",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38688"
},
{
"name": "CVE-2025-38333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38333"
},
{
"name": "CVE-2025-40295",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40295"
},
{
"name": "CVE-2025-68192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68192"
},
{
"name": "CVE-2025-37970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37970"
},
{
"name": "CVE-2025-21884",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21884"
},
{
"name": "CVE-2025-37905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37905"
},
{
"name": "CVE-2025-38390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38390"
},
{
"name": "CVE-2025-38013",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38013"
},
{
"name": "CVE-2025-40098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40098"
},
{
"name": "CVE-2025-38059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38059"
},
{
"name": "CVE-2025-38713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38713"
},
{
"name": "CVE-2025-37956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37956"
},
{
"name": "CVE-2025-40243",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40243"
},
{
"name": "CVE-2025-40196",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40196"
},
{
"name": "CVE-2025-38148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38148"
},
{
"name": "CVE-2025-40129",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40129"
},
{
"name": "CVE-2025-38467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38467"
},
{
"name": "CVE-2025-38117",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38117"
},
{
"name": "CVE-2025-38094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38094"
},
{
"name": "CVE-2025-68171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68171"
},
{
"name": "CVE-2025-38072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38072"
},
{
"name": "CVE-2025-37967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37967"
},
{
"name": "CVE-2025-40301",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40301"
},
{
"name": "CVE-2025-38300",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38300"
},
{
"name": "CVE-2025-40040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40040"
},
{
"name": "CVE-2025-38289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38289"
},
{
"name": "CVE-2025-39782",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39782"
},
{
"name": "CVE-2025-68207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68207"
},
{
"name": "CVE-2025-40066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40066"
},
{
"name": "CVE-2025-38075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38075"
},
{
"name": "CVE-2025-37885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37885"
},
{
"name": "CVE-2025-38697",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38697"
},
{
"name": "CVE-2025-37949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37949"
},
{
"name": "CVE-2025-68167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68167"
},
{
"name": "CVE-2025-38691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38691"
},
{
"name": "CVE-2025-40207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40207"
},
{
"name": "CVE-2025-38373",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38373"
},
{
"name": "CVE-2025-38489",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38489"
},
{
"name": "CVE-2025-40095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40095"
},
{
"name": "CVE-2025-37957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37957"
},
{
"name": "CVE-2025-38058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38058"
},
{
"name": "CVE-2025-38483",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38483"
},
{
"name": "CVE-2025-38369",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38369"
},
{
"name": "CVE-2025-39759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39759"
},
{
"name": "CVE-2025-38639",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38639"
},
{
"name": "CVE-2025-38122",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38122"
},
{
"name": "CVE-2025-38612",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38612"
},
{
"name": "CVE-2025-40299",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40299"
},
{
"name": "CVE-2025-38173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38173"
},
{
"name": "CVE-2025-40286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40286"
},
{
"name": "CVE-2025-38143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38143"
},
{
"name": "CVE-2025-38098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38098"
},
{
"name": "CVE-2025-40091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40091"
},
{
"name": "CVE-2025-40318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40318"
},
{
"name": "CVE-2025-38566",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38566"
},
{
"name": "CVE-2025-39721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39721"
},
{
"name": "CVE-2025-68241",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68241"
},
{
"name": "CVE-2025-39760",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39760"
},
{
"name": "CVE-2025-40118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40118"
},
{
"name": "CVE-2025-38718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38718"
},
{
"name": "CVE-2025-38392",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38392"
},
{
"name": "CVE-2025-39673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39673"
},
{
"name": "CVE-2025-38259",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38259"
},
{
"name": "CVE-2025-38663",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38663"
},
{
"name": "CVE-2025-40135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40135"
},
{
"name": "CVE-2025-38156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38156"
},
{
"name": "CVE-2025-37951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37951"
},
{
"name": "CVE-2025-37840",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37840"
},
{
"name": "CVE-2025-68253",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68253"
},
{
"name": "CVE-2025-68734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68734"
},
{
"name": "CVE-2025-37947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37947"
},
{
"name": "CVE-2025-38416",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38416"
},
{
"name": "CVE-2025-37846",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37846"
},
{
"name": "CVE-2025-38722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38722"
},
{
"name": "CVE-2025-38192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38192"
},
{
"name": "CVE-2025-39800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39800"
},
{
"name": "CVE-2025-40044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40044"
},
{
"name": "CVE-2025-38343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38343"
},
{
"name": "CVE-2025-40105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40105"
},
{
"name": "CVE-2025-38202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38202"
},
{
"name": "CVE-2025-40050",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40050"
},
{
"name": "CVE-2025-40072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40072"
},
{
"name": "CVE-2025-40112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40112"
},
{
"name": "CVE-2025-40079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40079"
},
{
"name": "CVE-2025-22101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22101"
},
{
"name": "CVE-2025-38374",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38374"
},
{
"name": "CVE-2025-39703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39703"
},
{
"name": "CVE-2025-38194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38194"
},
{
"name": "CVE-2025-68182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68182"
},
{
"name": "CVE-2025-38549",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38549"
},
{
"name": "CVE-2025-40310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40310"
},
{
"name": "CVE-2025-38665",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38665"
},
{
"name": "CVE-2025-38101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38101"
},
{
"name": "CVE-2025-37982",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37982"
},
{
"name": "CVE-2025-37992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37992"
},
{
"name": "CVE-2025-38577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38577"
},
{
"name": "CVE-2025-38671",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38671"
},
{
"name": "CVE-2025-68317",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68317"
},
{
"name": "CVE-2025-38299",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38299"
},
{
"name": "CVE-2025-40154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40154"
},
{
"name": "CVE-2025-40331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40331"
},
{
"name": "CVE-2025-38635",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38635"
},
{
"name": "CVE-2025-38704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38704"
},
{
"name": "CVE-2025-38348",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38348"
},
{
"name": "CVE-2025-40270",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40270"
},
{
"name": "CVE-2025-40191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40191"
},
{
"name": "CVE-2025-38488",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38488"
},
{
"name": "CVE-2025-40189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40189"
},
{
"name": "CVE-2025-40093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40093"
},
{
"name": "CVE-2025-38540",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38540"
},
{
"name": "CVE-2025-38040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38040"
},
{
"name": "CVE-2025-38265",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38265"
},
{
"name": "CVE-2025-23149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23149"
},
{
"name": "CVE-2025-38403",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38403"
},
{
"name": "CVE-2025-38552",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38552"
},
{
"name": "CVE-2025-40335",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40335"
},
{
"name": "CVE-2025-40149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40149"
},
{
"name": "CVE-2025-37914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37914"
},
{
"name": "CVE-2025-40164",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40164"
},
{
"name": "CVE-2025-37873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37873"
},
{
"name": "CVE-2025-37928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37928"
},
{
"name": "CVE-2025-40267",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40267"
},
{
"name": "CVE-2025-40235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40235"
},
{
"name": "CVE-2025-39766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39766"
},
{
"name": "CVE-2025-39801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39801"
},
{
"name": "CVE-2025-37922",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37922"
},
{
"name": "CVE-2025-38146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38146"
},
{
"name": "CVE-2025-68208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68208"
},
{
"name": "CVE-2025-39724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39724"
},
{
"name": "CVE-2025-39687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39687"
},
{
"name": "CVE-2025-37794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37794"
},
{
"name": "CVE-2025-38510",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38510"
},
{
"name": "CVE-2025-38246",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38246"
},
{
"name": "CVE-2025-39758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39758"
},
{
"name": "CVE-2025-39694",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39694"
},
{
"name": "CVE-2025-38220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38220"
},
{
"name": "CVE-2025-38405",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38405"
},
{
"name": "CVE-2025-38418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38418"
},
{
"name": "CVE-2025-40352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40352"
},
{
"name": "CVE-2025-38090",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38090"
},
{
"name": "CVE-2025-38429",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38429"
},
{
"name": "CVE-2025-38225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38225"
},
{
"name": "CVE-2025-22037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22037"
},
{
"name": "CVE-2025-40280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40280"
},
{
"name": "CVE-2025-38155",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38155"
},
{
"name": "CVE-2025-40099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40099"
},
{
"name": "CVE-2025-37977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37977"
},
{
"name": "CVE-2025-38365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38365"
},
{
"name": "CVE-2025-38415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38415"
},
{
"name": "CVE-2025-40031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40031"
},
{
"name": "CVE-2025-40180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40180"
},
{
"name": "CVE-2025-40293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40293"
},
{
"name": "CVE-2025-38668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38668"
},
{
"name": "CVE-2025-37973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37973"
},
{
"name": "CVE-2025-40330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40330"
},
{
"name": "CVE-2025-68750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68750"
},
{
"name": "CVE-2025-38260",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38260"
},
{
"name": "CVE-2025-37827",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37827"
},
{
"name": "CVE-2025-38721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38721"
},
{
"name": "CVE-2025-38244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38244"
},
{
"name": "CVE-2025-38080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38080"
},
{
"name": "CVE-2025-40126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40126"
},
{
"name": "CVE-2025-37748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37748"
},
{
"name": "CVE-2025-38364",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38364"
},
{
"name": "CVE-2025-38615",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38615"
},
{
"name": "CVE-2025-39684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39684"
},
{
"name": "CVE-2025-37836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37836"
},
{
"name": "CVE-2025-38526",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38526"
},
{
"name": "CVE-2025-38472",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38472"
},
{
"name": "CVE-2025-37944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37944"
},
{
"name": "CVE-2025-38506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38506"
},
{
"name": "CVE-2025-40320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40320"
},
{
"name": "CVE-2025-38703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38703"
},
{
"name": "CVE-2025-38494",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38494"
},
{
"name": "CVE-2025-39753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39753"
},
{
"name": "CVE-2025-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38604"
},
{
"name": "CVE-2025-40203",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40203"
},
{
"name": "CVE-2025-38623",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38623"
},
{
"name": "CVE-2025-38193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38193"
},
{
"name": "CVE-2025-38400",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38400"
},
{
"name": "CVE-2025-38136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38136"
},
{
"name": "CVE-2025-40192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40192"
},
{
"name": "CVE-2025-38544",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38544"
},
{
"name": "CVE-2025-37771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37771"
},
{
"name": "CVE-2025-39797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39797"
},
{
"name": "CVE-2025-40200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40200"
},
{
"name": "CVE-2025-38236",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38236"
},
{
"name": "CVE-2025-38725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38725"
},
{
"name": "CVE-2025-37975",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37975"
},
{
"name": "CVE-2025-40124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40124"
},
{
"name": "CVE-2025-38347",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38347"
},
{
"name": "CVE-2025-39776",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39776"
},
{
"name": "CVE-2025-37998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37998"
},
{
"name": "CVE-2025-38198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38198"
},
{
"name": "CVE-2025-23163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23163"
},
{
"name": "CVE-2025-40094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40094"
},
{
"name": "CVE-2025-37968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37968"
},
{
"name": "CVE-2025-38376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38376"
},
{
"name": "CVE-2025-38006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38006"
},
{
"name": "CVE-2025-40102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40102"
},
{
"name": "CVE-2025-40170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40170"
},
{
"name": "CVE-2025-38437",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38437"
},
{
"name": "CVE-2025-40160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40160"
},
{
"name": "CVE-2025-40284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40284"
},
{
"name": "CVE-2025-38125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38125"
},
{
"name": "CVE-2025-40209",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40209"
},
{
"name": "CVE-2025-40077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40077"
},
{
"name": "CVE-2025-38351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38351"
},
{
"name": "CVE-2025-38048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38048"
},
{
"name": "CVE-2025-40071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40071"
},
{
"name": "CVE-2025-38683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38683"
},
{
"name": "CVE-2025-40113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40113"
},
{
"name": "CVE-2025-39736",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39736"
},
{
"name": "CVE-2025-40234",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40234"
},
{
"name": "CVE-2025-37757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37757"
},
{
"name": "CVE-2025-68247",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68247"
},
{
"name": "CVE-2025-40305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40305"
},
{
"name": "CVE-2025-40080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40080"
},
{
"name": "CVE-2025-38009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38009"
},
{
"name": "CVE-2025-40215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40215"
},
{
"name": "CVE-2025-40307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40307"
},
{
"name": "CVE-2025-40111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40111"
},
{
"name": "CVE-2025-38081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38081"
},
{
"name": "CVE-2025-37809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37809"
},
{
"name": "CVE-2024-36350",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36350"
},
{
"name": "CVE-2025-40211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40211"
},
{
"name": "CVE-2025-40068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40068"
},
{
"name": "CVE-2025-38185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38185"
},
{
"name": "CVE-2025-39691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39691"
},
{
"name": "CVE-2025-38406",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38406"
},
{
"name": "CVE-2025-68315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68315"
},
{
"name": "CVE-2025-40163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40163"
},
{
"name": "CVE-2025-40042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40042"
},
{
"name": "CVE-2025-37817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37817"
},
{
"name": "CVE-2025-40155",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40155"
},
{
"name": "CVE-2025-39890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39890"
},
{
"name": "CVE-2025-39742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39742"
},
{
"name": "CVE-2025-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40217"
},
{
"name": "CVE-2025-22102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22102"
},
{
"name": "CVE-2025-37987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37987"
},
{
"name": "CVE-2025-37749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37749"
},
{
"name": "CVE-2024-36331",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36331"
},
{
"name": "CVE-2025-39748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39748"
},
{
"name": "CVE-2025-40133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40133"
},
{
"name": "CVE-2025-38263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38263"
},
{
"name": "CVE-2025-38610",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38610"
},
{
"name": "CVE-2025-37772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37772"
},
{
"name": "CVE-2025-38214",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38214"
},
{
"name": "CVE-2025-38560",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38560"
},
{
"name": "CVE-2025-37994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37994"
},
{
"name": "CVE-2025-38551",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38551"
},
{
"name": "CVE-2025-38701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38701"
},
{
"name": "CVE-2025-38218",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38218"
},
{
"name": "CVE-2025-40329",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40329"
},
{
"name": "CVE-2025-38349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38349"
},
{
"name": "CVE-2025-39726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39726"
},
{
"name": "CVE-2025-38393",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38393"
},
{
"name": "CVE-2025-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37891"
},
{
"name": "CVE-2025-38249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38249"
},
{
"name": "CVE-2025-38716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38716"
},
{
"name": "CVE-2025-37858",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37858"
},
{
"name": "CVE-2025-38154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38154"
},
{
"name": "CVE-2025-38469",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38469"
},
{
"name": "CVE-2025-38581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38581"
},
{
"name": "CVE-2025-40034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40034"
},
{
"name": "CVE-2025-40060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40060"
},
{
"name": "CVE-2025-39790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39790"
},
{
"name": "CVE-2025-38389",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38389"
},
{
"name": "CVE-2025-38448",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38448"
},
{
"name": "CVE-2025-37780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37780"
},
{
"name": "CVE-2025-37995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37995"
},
{
"name": "CVE-2025-38680",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38680"
},
{
"name": "CVE-2025-37754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37754"
},
{
"name": "CVE-2025-40059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40059"
},
{
"name": "CVE-2025-38497",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38497"
},
{
"name": "CVE-2025-68168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68168"
},
{
"name": "CVE-2025-23156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23156"
},
{
"name": "CVE-2025-23157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23157"
},
{
"name": "CVE-2025-68206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68206"
},
{
"name": "CVE-2025-68309",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68309"
},
{
"name": "CVE-2025-38684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38684"
},
{
"name": "CVE-2025-38165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38165"
},
{
"name": "CVE-2025-40003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40003"
},
{
"name": "CVE-2025-39686",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39686"
},
{
"name": "CVE-2025-39798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39798"
},
{
"name": "CVE-2025-38495",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38495"
},
{
"name": "CVE-2025-37808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37808"
},
{
"name": "CVE-2025-38730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38730"
},
{
"name": "CVE-2025-38052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38052"
},
{
"name": "CVE-2025-38377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38377"
},
{
"name": "CVE-2025-40175",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40175"
},
{
"name": "CVE-2025-68170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68170"
},
{
"name": "CVE-2025-39747",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39747"
},
{
"name": "CVE-2025-68313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68313"
},
{
"name": "CVE-2025-38516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38516"
},
{
"name": "CVE-2025-38462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38462"
},
{
"name": "CVE-2025-38428",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38428"
},
{
"name": "CVE-2025-39714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39714"
},
{
"name": "CVE-2025-38262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38262"
},
{
"name": "CVE-2025-38138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38138"
},
{
"name": "CVE-2025-38035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38035"
},
{
"name": "CVE-2025-37759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37759"
},
{
"name": "CVE-2025-38414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38414"
},
{
"name": "CVE-2025-68197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68197"
},
{
"name": "CVE-2025-40123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40123"
},
{
"name": "CVE-2025-37933",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37933"
},
{
"name": "CVE-2025-38310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38310"
},
{
"name": "CVE-2025-37886",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37886"
},
{
"name": "CVE-2025-37963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37963"
},
{
"name": "CVE-2025-40297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40297"
},
{
"name": "CVE-2025-38226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38226"
},
{
"name": "CVE-2025-39706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39706"
},
{
"name": "CVE-2025-40178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40178"
},
{
"name": "CVE-2025-40363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40363"
},
{
"name": "CVE-2025-38443",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38443"
},
{
"name": "CVE-2025-38576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38576"
},
{
"name": "CVE-2025-37800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37800"
},
{
"name": "CVE-2025-40276",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40276"
},
{
"name": "CVE-2025-37900",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37900"
},
{
"name": "CVE-2025-40224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40224"
},
{
"name": "CVE-2025-38439",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38439"
},
{
"name": "CVE-2025-37805",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37805"
},
{
"name": "CVE-2025-68245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68245"
},
{
"name": "CVE-2025-39719",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39719"
},
{
"name": "CVE-2025-40317",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40317"
},
{
"name": "CVE-2025-40236",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40236"
},
{
"name": "CVE-2025-37990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37990"
},
{
"name": "CVE-2025-38553",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38553"
},
{
"name": "CVE-2025-38190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38190"
},
{
"name": "CVE-2025-38180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38180"
},
{
"name": "CVE-2025-39738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39738"
},
{
"name": "CVE-2025-68202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68202"
},
{
"name": "CVE-2025-38145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38145"
},
{
"name": "CVE-2025-40174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40174"
},
{
"name": "CVE-2025-37948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37948"
},
{
"name": "CVE-2025-38166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38166"
},
{
"name": "CVE-2025-40227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40227"
},
{
"name": "CVE-2025-37862",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37862"
},
{
"name": "CVE-2025-38321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38321"
},
{
"name": "CVE-2025-39705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39705"
},
{
"name": "CVE-2025-40316",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40316"
},
{
"name": "CVE-2025-37960",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37960"
},
{
"name": "CVE-2025-38045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38045"
},
{
"name": "CVE-2025-38051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38051"
},
{
"name": "CVE-2025-39713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39713"
},
{
"name": "CVE-2025-37763",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37763"
},
{
"name": "CVE-2025-37954",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37954"
},
{
"name": "CVE-2025-22128",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22128"
},
{
"name": "CVE-2025-40065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40065"
},
{
"name": "CVE-2025-37839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37839"
},
{
"name": "CVE-2025-39744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39744"
},
{
"name": "CVE-2025-38277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38277"
},
{
"name": "CVE-2025-37913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37913"
},
{
"name": "CVE-2025-68177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68177"
},
{
"name": "CVE-2025-39756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39756"
},
{
"name": "CVE-2025-38539",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38539"
},
{
"name": "CVE-2025-40181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40181"
},
{
"name": "CVE-2025-68191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68191"
},
{
"name": "CVE-2025-38044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38044"
},
{
"name": "CVE-2025-68250",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68250"
},
{
"name": "CVE-2025-37786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37786"
},
{
"name": "CVE-2025-40141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40141"
},
{
"name": "CVE-2025-38200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38200"
},
{
"name": "CVE-2025-38480",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38480"
},
{
"name": "CVE-2025-40132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40132"
},
{
"name": "CVE-2025-38346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38346"
},
{
"name": "CVE-2025-40152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40152"
},
{
"name": "CVE-2025-37959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37959"
},
{
"name": "CVE-2025-38191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38191"
},
{
"name": "CVE-2025-39946",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39946"
},
{
"name": "CVE-2024-50299",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50299"
},
{
"name": "CVE-2025-38062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38062"
},
{
"name": "CVE-2025-38531",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38531"
},
{
"name": "CVE-2025-40288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40288"
},
{
"name": "CVE-2025-68239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68239"
},
{
"name": "CVE-2025-39693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39693"
},
{
"name": "CVE-2025-40281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40281"
},
{
"name": "CVE-2025-68185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68185"
},
{
"name": "CVE-2025-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40304"
},
{
"name": "CVE-2025-38503",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38503"
},
{
"name": "CVE-2025-40110",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40110"
},
{
"name": "CVE-2025-40162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40162"
},
{
"name": "CVE-2025-38630",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38630"
},
{
"name": "CVE-2025-38131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38131"
},
{
"name": "CVE-2025-40268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40268"
},
{
"name": "CVE-2025-37851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37851"
},
{
"name": "CVE-2025-38481",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38481"
},
{
"name": "CVE-2025-38585",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38585"
},
{
"name": "CVE-2025-38320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38320"
},
{
"name": "CVE-2025-38625",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38625"
},
{
"name": "CVE-2025-38164",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38164"
},
{
"name": "CVE-2025-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40303"
},
{
"name": "CVE-2025-68178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68178"
},
{
"name": "CVE-2025-40337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40337"
},
{
"name": "CVE-2025-40346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40346"
},
{
"name": "CVE-2025-38264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38264"
},
{
"name": "CVE-2025-40036",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40036"
},
{
"name": "CVE-2025-39676",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39676"
},
{
"name": "CVE-2025-40241",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40241"
},
{
"name": "CVE-2025-37980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37980"
},
{
"name": "CVE-2025-38280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38280"
},
{
"name": "CVE-2025-37788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37788"
},
{
"name": "CVE-2025-38427",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38427"
},
{
"name": "CVE-2025-38084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38084"
},
{
"name": "CVE-2025-40046",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40046"
},
{
"name": "CVE-2025-37879",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37879"
},
{
"name": "CVE-2025-38217",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38217"
},
{
"name": "CVE-2025-40030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40030"
},
{
"name": "CVE-2025-40244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40244"
},
{
"name": "CVE-2025-37881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37881"
},
{
"name": "CVE-2025-38103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38103"
},
{
"name": "CVE-2025-38514",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38514"
},
{
"name": "CVE-2025-39783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39783"
},
{
"name": "CVE-2025-39715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39715"
},
{
"name": "CVE-2025-40323",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40323"
},
{
"name": "CVE-2025-38569",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38569"
},
{
"name": "CVE-2025-38255",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38255"
},
{
"name": "CVE-2025-38512",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38512"
},
{
"name": "CVE-2025-40096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40096"
},
{
"name": "CVE-2025-38622",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38622"
},
{
"name": "CVE-2025-37909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37909"
},
{
"name": "CVE-2025-38700",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38700"
},
{
"name": "CVE-2025-37849",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37849"
},
{
"name": "CVE-2025-38162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38162"
},
{
"name": "CVE-2025-38532",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38532"
},
{
"name": "CVE-2025-39712",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39712"
},
{
"name": "CVE-2025-37812",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37812"
},
{
"name": "CVE-2025-39707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39707"
},
{
"name": "CVE-2025-40275",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40275"
},
{
"name": "CVE-2025-37875",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37875"
},
{
"name": "CVE-2025-38410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38410"
},
{
"name": "CVE-2025-40182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40182"
},
{
"name": "CVE-2025-68211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68211"
},
{
"name": "CVE-2025-39781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39781"
},
{
"name": "CVE-2025-38640",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38640"
},
{
"name": "CVE-2025-38476",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38476"
},
{
"name": "CVE-2025-38659",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38659"
},
{
"name": "CVE-2025-40339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40339"
},
{
"name": "CVE-2025-40140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40140"
},
{
"name": "CVE-2025-38020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38020"
},
{
"name": "CVE-2025-40223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40223"
},
{
"name": "CVE-2025-38572",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38572"
},
{
"name": "CVE-2025-23140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23140"
},
{
"name": "CVE-2025-23150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23150"
},
{
"name": "CVE-2025-38460",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38460"
},
{
"name": "CVE-2025-40061",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40061"
},
{
"name": "CVE-2025-38182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38182"
},
{
"name": "CVE-2025-38550",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38550"
},
{
"name": "CVE-2025-38275",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38275"
},
{
"name": "CVE-2025-40213",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40213"
},
{
"name": "CVE-2025-38345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38345"
},
{
"name": "CVE-2025-40334",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40334"
},
{
"name": "CVE-2025-38170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38170"
},
{
"name": "CVE-2025-39711",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39711"
},
{
"name": "CVE-2025-22115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22115"
},
{
"name": "CVE-2025-22120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22120"
},
{
"name": "CVE-2025-38535",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38535"
},
{
"name": "CVE-2022-49267",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49267"
},
{
"name": "CVE-2025-38231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38231"
},
{
"name": "CVE-2025-37854",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37854"
},
{
"name": "CVE-2025-40142",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40142"
},
{
"name": "CVE-2025-40159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40159"
},
{
"name": "CVE-2025-40319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40319"
},
{
"name": "CVE-2025-68193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68193"
},
{
"name": "CVE-2025-38473",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38473"
},
{
"name": "CVE-2025-38113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38113"
},
{
"name": "CVE-2025-38714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38714"
},
{
"name": "CVE-2025-23148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23148"
},
{
"name": "CVE-2025-38361",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38361"
},
{
"name": "CVE-2025-38470",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38470"
},
{
"name": "CVE-2025-38181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38181"
},
{
"name": "CVE-2025-40051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40051"
},
{
"name": "CVE-2025-38391",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38391"
},
{
"name": "CVE-2025-38248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38248"
},
{
"name": "CVE-2025-40351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40351"
},
{
"name": "CVE-2025-40087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40087"
},
{
"name": "CVE-2025-40229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40229"
},
{
"name": "CVE-2025-23147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23147"
},
{
"name": "CVE-2025-39752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39752"
}
],
"initial_release_date": "2026-02-27T00:00:00",
"last_revision_date": "2026-02-27T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0227",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-02-27T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux d\u0027Ubuntu. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et un contournement de la politique de s\u00e9curit\u00e9.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8060-1",
"url": "https://ubuntu.com/security/notices/USN-8060-1"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8059-2",
"url": "https://ubuntu.com/security/notices/USN-8059-2"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8028-8",
"url": "https://ubuntu.com/security/notices/USN-8028-8"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8060-4",
"url": "https://ubuntu.com/security/notices/USN-8060-4"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8052-2",
"url": "https://ubuntu.com/security/notices/USN-8052-2"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8060-2",
"url": "https://ubuntu.com/security/notices/USN-8060-2"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8059-4",
"url": "https://ubuntu.com/security/notices/USN-8059-4"
},
{
"published_at": "2026-02-26",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8059-6",
"url": "https://ubuntu.com/security/notices/USN-8059-6"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8061-1",
"url": "https://ubuntu.com/security/notices/USN-8061-1"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8060-3",
"url": "https://ubuntu.com/security/notices/USN-8060-3"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8059-1",
"url": "https://ubuntu.com/security/notices/USN-8059-1"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8029-3",
"url": "https://ubuntu.com/security/notices/USN-8029-3"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8059-5",
"url": "https://ubuntu.com/security/notices/USN-8059-5"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8059-3",
"url": "https://ubuntu.com/security/notices/USN-8059-3"
},
{
"published_at": "2026-02-20",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8015-5",
"url": "https://ubuntu.com/security/notices/USN-8015-5"
}
]
}
CERTFR-2026-AVI-0326
Vulnerability from certfr_avis - Published: 2026-03-20 - Updated: 2026-03-20
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Platform | Isolation Segmentation pour VMware Tanzu Platform versions antérieures à 6.0.26+LTS-T | ||
| VMware | Tanzu Platform | Isolation Segmentation pour VMware Tanzu Platform versions antérieures à 10.3.6 | ||
| VMware | Tanzu Platform | App Autoscaler CLI Plugin pour VMware Tanzu Platform versions antérieures à 250.6.9 | ||
| VMware | N/A | Python Buildpack versions antérieures à 1.8.83 | ||
| VMware | Tanzu Platform | Tanzu Platform versions antérieures à 3.1.9 | ||
| VMware | Tanzu Platform | Tanzu RabbitMQ sur Tanzu Platform versions antérieures à 2.4.4 | ||
| VMware | N/A | PHP Buildpack versions antérieures à 4.6.69 | ||
| VMware | Tanzu Platform | Tanzu Platform versions antérieures à 3.2.5 | ||
| VMware | Tanzu Platform | Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions antérieures à 10.2.9+LTS-T | ||
| VMware | Tanzu Platform | App Autoscaler CLI Plugin pour VMware Tanzu Platform versions antérieures à 250.5.17 | ||
| VMware | Tanzu Platform | Tanzu RabbitMQ pour Tanzu Platform versions antérieures à 10.1.2 | ||
| VMware | Tanzu Platform | Tanzu Platform versions antérieures à 2.4.6 | ||
| VMware | Tanzu Platform | Tanzu Platform versions antérieures à 1.16.18 | ||
| VMware | Tanzu Platform | Tanzu for Valkey sur Tanzu Platform versions antérieures à 10.2.2 | ||
| VMware | Tanzu Platform | Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions antérieures à 6.0.26+LTS-T | ||
| VMware | Tanzu Platform | Isolation Segmentation pour VMware Tanzu Platform versions antérieures à 10.2.9+LTS-T | ||
| VMware | Tanzu Platform | Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions antérieures à 10.3.6 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Isolation Segmentation pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 6.0.26+LTS-T",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Isolation Segmentation pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.3.6",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "App Autoscaler CLI Plugin pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 250.6.9",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Python Buildpack versions ant\u00e9rieures \u00e0 1.8.83",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions ant\u00e9rieures \u00e0 3.1.9",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu RabbitMQ sur Tanzu Platform versions ant\u00e9rieures \u00e0 2.4.4",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "PHP Buildpack versions ant\u00e9rieures \u00e0 4.6.69",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions ant\u00e9rieures \u00e0 3.2.5",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.2.9+LTS-T",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "App Autoscaler CLI Plugin pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 250.5.17",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu RabbitMQ pour Tanzu Platform versions ant\u00e9rieures \u00e0 10.1.2",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions ant\u00e9rieures \u00e0 2.4.6",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions ant\u00e9rieures \u00e0 1.16.18",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu for Valkey sur Tanzu Platform versions ant\u00e9rieures \u00e0 10.2.2",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 6.0.26+LTS-T",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Isolation Segmentation pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.2.9+LTS-T",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.3.6",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2026-28422",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28422"
},
{
"name": "CVE-2024-36903",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36903"
},
{
"name": "CVE-2024-35875",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35875"
},
{
"name": "CVE-2022-50759",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50759"
},
{
"name": "CVE-2026-26007",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26007"
},
{
"name": "CVE-2025-71075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71075"
},
{
"name": "CVE-2024-49912",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49912"
},
{
"name": "CVE-2024-36026",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36026"
},
{
"name": "CVE-2026-23198",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23198"
},
{
"name": "CVE-2023-3640",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3640"
},
{
"name": "CVE-2024-27435",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27435"
},
{
"name": "CVE-2025-40273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40273"
},
{
"name": "CVE-2023-53714",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53714"
},
{
"name": "CVE-2024-42122",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42122"
},
{
"name": "CVE-2025-68230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68230"
},
{
"name": "CVE-2026-28420",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28420"
},
{
"name": "CVE-2022-49069",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49069"
},
{
"name": "CVE-2024-57875",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57875"
},
{
"name": "CVE-2022-27943",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27943"
},
{
"name": "CVE-2025-40064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40064"
},
{
"name": "CVE-2023-54129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54129"
},
{
"name": "CVE-2025-66865",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66865"
},
{
"name": "CVE-2024-41031",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41031"
},
{
"name": "CVE-2025-39992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39992"
},
{
"name": "CVE-2025-69534",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69534"
},
{
"name": "CVE-2025-61730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61730"
},
{
"name": "CVE-2022-49543",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49543"
},
{
"name": "CVE-2026-23202",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23202"
},
{
"name": "CVE-2025-38485",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38485"
},
{
"name": "CVE-2023-53562",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53562"
},
{
"name": "CVE-2025-68324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68324"
},
{
"name": "CVE-2025-22026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22026"
},
{
"name": "CVE-2023-54149",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54149"
},
{
"name": "CVE-2025-71086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71086"
},
{
"name": "CVE-2024-50063",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50063"
},
{
"name": "CVE-2023-33875",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33875"
},
{
"name": "CVE-2024-41001",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41001"
},
{
"name": "CVE-2024-42155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42155"
},
{
"name": "CVE-2026-23167",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23167"
},
{
"name": "CVE-2025-36353",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36353"
},
{
"name": "CVE-2025-68196",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68196"
},
{
"name": "CVE-2024-46770",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46770"
},
{
"name": "CVE-2023-53247",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53247"
},
{
"name": "CVE-2025-38042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38042"
},
{
"name": "CVE-2025-22083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22083"
},
{
"name": "CVE-2023-53829",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53829"
},
{
"name": "CVE-2025-58183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58183"
},
{
"name": "CVE-2025-59830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59830"
},
{
"name": "CVE-2023-54002",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54002"
},
{
"name": "CVE-2022-50550",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50550"
},
{
"name": "CVE-2022-0400",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0400"
},
{
"name": "CVE-2022-49138",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49138"
},
{
"name": "CVE-2025-66199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66199"
},
{
"name": "CVE-2024-42239",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42239"
},
{
"name": "CVE-2022-49359",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49359"
},
{
"name": "CVE-2025-68342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68342"
},
{
"name": "CVE-2022-48673",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48673"
},
{
"name": "CVE-2022-50425",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50425"
},
{
"name": "CVE-2025-38201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38201"
},
{
"name": "CVE-2024-39293",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39293"
},
{
"name": "CVE-2023-53008",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53008"
},
{
"name": "CVE-2025-38669",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38669"
},
{
"name": "CVE-2025-40137",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40137"
},
{
"name": "CVE-2023-54052",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54052"
},
{
"name": "CVE-2025-22107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22107"
},
{
"name": "CVE-2024-38306",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38306"
},
{
"name": "CVE-2023-53733",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53733"
},
{
"name": "CVE-2025-37775",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37775"
},
{
"name": "CVE-2025-21682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21682"
},
{
"name": "CVE-2023-1386",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1386"
},
{
"name": "CVE-2024-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35939"
},
{
"name": "CVE-2024-39298",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39298"
},
{
"name": "CVE-2024-56703",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56703"
},
{
"name": "CVE-2026-23098",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23098"
},
{
"name": "CVE-2023-53347",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53347"
},
{
"name": "CVE-2023-28374",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28374"
},
{
"name": "CVE-2023-52926",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52926"
},
{
"name": "CVE-2026-32597",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32597"
},
{
"name": "CVE-2025-68286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68286"
},
{
"name": "CVE-2025-9231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9231"
},
{
"name": "CVE-2024-36921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36921"
},
{
"name": "CVE-2025-40057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40057"
},
{
"name": "CVE-2024-41050",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41050"
},
{
"name": "CVE-2026-25500",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25500"
},
{
"name": "CVE-2024-26656",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26656"
},
{
"name": "CVE-2025-38520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38520"
},
{
"name": "CVE-2025-27558",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27558"
},
{
"name": "CVE-2025-71094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71094"
},
{
"name": "CVE-2026-21637",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21637"
},
{
"name": "CVE-2024-35998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35998"
},
{
"name": "CVE-2024-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
},
{
"name": "CVE-2021-0076",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0076"
},
{
"name": "CVE-2025-68788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68788"
},
{
"name": "CVE-2024-58237",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58237"
},
{
"name": "CVE-2024-36909",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36909"
},
{
"name": "CVE-2024-42147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42147"
},
{
"name": "CVE-2023-53529",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53529"
},
{
"name": "CVE-2024-50028",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50028"
},
{
"name": "CVE-2023-53042",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53042"
},
{
"name": "CVE-2022-50527",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50527"
},
{
"name": "CVE-2023-54280",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54280"
},
{
"name": "CVE-2025-21786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21786"
},
{
"name": "CVE-2024-58094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58094"
},
{
"name": "CVE-2024-11187",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11187"
},
{
"name": "CVE-2025-52534",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52534"
},
{
"name": "CVE-2025-40314",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40314"
},
{
"name": "CVE-2024-46705",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46705"
},
{
"name": "CVE-2022-50407",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50407"
},
{
"name": "CVE-2026-23196",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23196"
},
{
"name": "CVE-2024-26595",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26595"
},
{
"name": "CVE-2022-23825",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23825"
},
{
"name": "CVE-2024-45775",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45775"
},
{
"name": "CVE-2025-40306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40306"
},
{
"name": "CVE-2025-21881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21881"
},
{
"name": "CVE-2022-49901",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49901"
},
{
"name": "CVE-2026-23126",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23126"
},
{
"name": "CVE-2025-38329",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38329"
},
{
"name": "CVE-2021-33096",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33096"
},
{
"name": "CVE-2022-50230",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50230"
},
{
"name": "CVE-2024-35949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35949"
},
{
"name": "CVE-2025-39947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39947"
},
{
"name": "CVE-2025-68778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68778"
},
{
"name": "CVE-2023-53588",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53588"
},
{
"name": "CVE-2024-41082",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41082"
},
{
"name": "CVE-2023-53685",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53685"
},
{
"name": "CVE-2025-5222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5222"
},
{
"name": "CVE-2025-23155",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23155"
},
{
"name": "CVE-2026-23054",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23054"
},
{
"name": "CVE-2025-37870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37870"
},
{
"name": "CVE-2025-40254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40254"
},
{
"name": "CVE-2022-49533",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49533"
},
{
"name": "CVE-2024-42253",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42253"
},
{
"name": "CVE-2020-26557",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26557"
},
{
"name": "CVE-2025-71064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71064"
},
{
"name": "CVE-2023-54201",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54201"
},
{
"name": "CVE-2021-33114",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33114"
},
{
"name": "CVE-2025-69645",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69645"
},
{
"name": "CVE-2025-68200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68200"
},
{
"name": "CVE-2022-49518",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49518"
},
{
"name": "CVE-2024-56727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56727"
},
{
"name": "CVE-2022-49125",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49125"
},
{
"name": "CVE-2024-36900",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36900"
},
{
"name": "CVE-2025-38501",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38501"
},
{
"name": "CVE-2024-26866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26866"
},
{
"name": "CVE-2024-27010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27010"
},
{
"name": "CVE-2025-27516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27516"
},
{
"name": "CVE-2025-68736",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68736"
},
{
"name": "CVE-2023-52561",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52561"
},
{
"name": "CVE-2025-68725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68725"
},
{
"name": "CVE-2024-3220",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3220"
},
{
"name": "CVE-2024-53221",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53221"
},
{
"name": "CVE-2024-41069",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41069"
},
{
"name": "CVE-2025-68176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68176"
},
{
"name": "CVE-2025-37777",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37777"
},
{
"name": "CVE-2021-47432",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47432"
},
{
"name": "CVE-2026-24734",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24734"
},
{
"name": "CVE-2025-68204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68204"
},
{
"name": "CVE-2024-35878",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35878"
},
{
"name": "CVE-2023-53362",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53362"
},
{
"name": "CVE-2025-68795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68795"
},
{
"name": "CVE-2025-68349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68349"
},
{
"name": "CVE-2024-26756",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26756"
},
{
"name": "CVE-2022-50815",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50815"
},
{
"name": "CVE-2025-21931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21931"
},
{
"name": "CVE-2025-39826",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39826"
},
{
"name": "CVE-2025-38036",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38036"
},
{
"name": "CVE-2025-2668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2668"
},
{
"name": "CVE-2025-71221",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71221"
},
{
"name": "CVE-2025-37778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37778"
},
{
"name": "CVE-2025-39716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39716"
},
{
"name": "CVE-2024-46860",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46860"
},
{
"name": "CVE-2025-22040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22040"
},
{
"name": "CVE-2024-53095",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53095"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2025-8277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8277"
},
{
"name": "CVE-2025-8941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8941"
},
{
"name": "CVE-2022-38457",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38457"
},
{
"name": "CVE-2024-56665",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56665"
},
{
"name": "CVE-2025-38340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38340"
},
{
"name": "CVE-2025-38109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38109"
},
{
"name": "CVE-2023-53629",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53629"
},
{
"name": "CVE-2022-50178",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50178"
},
{
"name": "CVE-2025-39779",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39779"
},
{
"name": "CVE-2025-66866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66866"
},
{
"name": "CVE-2025-68283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68283"
},
{
"name": "CVE-2023-7216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7216"
},
{
"name": "CVE-2025-66614",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66614"
},
{
"name": "CVE-2025-37880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37880"
},
{
"name": "CVE-2025-36427",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36427"
},
{
"name": "CVE-2026-23217",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23217"
},
{
"name": "CVE-2025-15469",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15469"
},
{
"name": "CVE-2025-37833",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37833"
},
{
"name": "CVE-2025-39761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39761"
},
{
"name": "CVE-2024-38608",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38608"
},
{
"name": "CVE-2025-68246",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68246"
},
{
"name": "CVE-2025-68339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68339"
},
{
"name": "CVE-2025-40287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40287"
},
{
"name": "CVE-2023-53320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53320"
},
{
"name": "CVE-2024-44961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44961"
},
{
"name": "CVE-2026-23069",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23069"
},
{
"name": "CVE-2025-21656",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21656"
},
{
"name": "CVE-2024-46835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46835"
},
{
"name": "CVE-2025-69650",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69650"
},
{
"name": "CVE-2022-50554",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50554"
},
{
"name": "CVE-2023-53509",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53509"
},
{
"name": "CVE-2023-53421",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53421"
},
{
"name": "CVE-2025-11731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11731"
},
{
"name": "CVE-2026-22992",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22992"
},
{
"name": "CVE-2024-52005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52005"
},
{
"name": "CVE-2024-46775",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46775"
},
{
"name": "CVE-2025-39764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39764"
},
{
"name": "CVE-2025-38207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38207"
},
{
"name": "CVE-2022-49465",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49465"
},
{
"name": "CVE-2026-23004",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23004"
},
{
"name": "CVE-2024-26807",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26807"
},
{
"name": "CVE-2025-39720",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39720"
},
{
"name": "CVE-2023-54271",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54271"
},
{
"name": "CVE-2022-49742",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49742"
},
{
"name": "CVE-2025-71191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71191"
},
{
"name": "CVE-2025-68295",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68295"
},
{
"name": "CVE-2025-68728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68728"
},
{
"name": "CVE-2025-40780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40780"
},
{
"name": "CVE-2025-68364",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68364"
},
{
"name": "CVE-2024-42118",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42118"
},
{
"name": "CVE-2025-40100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40100"
},
{
"name": "CVE-2026-1965",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1965"
},
{
"name": "CVE-2024-52560",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52560"
},
{
"name": "CVE-2024-56604",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56604"
},
{
"name": "CVE-2026-23227",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23227"
},
{
"name": "CVE-2025-71087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71087"
},
{
"name": "CVE-2023-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
},
{
"name": "CVE-2023-52653",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52653"
},
{
"name": "CVE-2025-40285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40285"
},
{
"name": "CVE-2023-52508",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52508"
},
{
"name": "CVE-2025-69647",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69647"
},
{
"name": "CVE-2025-39827",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39827"
},
{
"name": "CVE-2024-50014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50014"
},
{
"name": "CVE-2022-49108",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49108"
},
{
"name": "CVE-2024-56677",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56677"
},
{
"name": "CVE-2025-38717",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38717"
},
{
"name": "CVE-2026-3497",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3497"
},
{
"name": "CVE-2025-22019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22019"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2025-40208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40208"
},
{
"name": "CVE-2025-39746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39746"
},
{
"name": "CVE-2024-26767",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26767"
},
{
"name": "CVE-2025-21872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21872"
},
{
"name": "CVE-2026-2219",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2219"
},
{
"name": "CVE-2025-68287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68287"
},
{
"name": "CVE-2025-40039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40039"
},
{
"name": "CVE-2025-38208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38208"
},
{
"name": "CVE-2024-35926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35926"
},
{
"name": "CVE-2024-27389",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27389"
},
{
"name": "CVE-2024-26983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26983"
},
{
"name": "CVE-2022-50627",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50627"
},
{
"name": "CVE-2024-50285",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50285"
},
{
"name": "CVE-2025-38099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38099"
},
{
"name": "CVE-2025-38524",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38524"
},
{
"name": "CVE-2025-38029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38029"
},
{
"name": "CVE-2022-49123",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49123"
},
{
"name": "CVE-2024-50289",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50289"
},
{
"name": "CVE-2023-53258",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53258"
},
{
"name": "CVE-2024-46813",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46813"
},
{
"name": "CVE-2024-38594",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38594"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2024-47658",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47658"
},
{
"name": "CVE-2022-41409",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41409"
},
{
"name": "CVE-2025-38096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38096"
},
{
"name": "CVE-2024-48873",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-48873"
},
{
"name": "CVE-2025-68746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68746"
},
{
"name": "CVE-2024-12797",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12797"
},
{
"name": "CVE-2023-53429",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53429"
},
{
"name": "CVE-2024-46765",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46765"
},
{
"name": "CVE-2022-50380",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50380"
},
{
"name": "CVE-2025-12084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12084"
},
{
"name": "CVE-2025-38039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38039"
},
{
"name": "CVE-2022-48990",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48990"
},
{
"name": "CVE-2024-24864",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24864"
},
{
"name": "CVE-2024-35832",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35832"
},
{
"name": "CVE-2024-36479",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36479"
},
{
"name": "CVE-2025-71133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71133"
},
{
"name": "CVE-2026-23220",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23220"
},
{
"name": "CVE-2024-45782",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45782"
},
{
"name": "CVE-2022-50785",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50785"
},
{
"name": "CVE-2025-39745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39745"
},
{
"name": "CVE-2024-35799",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35799"
},
{
"name": "CVE-2025-40103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40103"
},
{
"name": "CVE-2026-23020",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23020"
},
{
"name": "CVE-2025-38595",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38595"
},
{
"name": "CVE-2025-71223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71223"
},
{
"name": "CVE-2025-36098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36098"
},
{
"name": "CVE-2025-68796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68796"
},
{
"name": "CVE-2025-40016",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40016"
},
{
"name": "CVE-2023-53765",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53765"
},
{
"name": "CVE-2025-38626",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38626"
},
{
"name": "CVE-2025-40356",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40356"
},
{
"name": "CVE-2026-1642",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1642"
},
{
"name": "CVE-2025-45582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45582"
},
{
"name": "CVE-2023-53325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53325"
},
{
"name": "CVE-2025-21752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21752"
},
{
"name": "CVE-2026-27138",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27138"
},
{
"name": "CVE-2025-40312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40312"
},
{
"name": "CVE-2025-37852",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37852"
},
{
"name": "CVE-2025-68220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68220"
},
{
"name": "CVE-2025-22125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22125"
},
{
"name": "CVE-2019-6293",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6293"
},
{
"name": "CVE-2024-26953",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26953"
},
{
"name": "CVE-2024-39282",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39282"
},
{
"name": "CVE-2025-21738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21738"
},
{
"name": "CVE-2023-50868",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50868"
},
{
"name": "CVE-2025-68302",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68302"
},
{
"name": "CVE-2024-50146",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50146"
},
{
"name": "CVE-2025-68238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68238"
},
{
"name": "CVE-2024-56709",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56709"
},
{
"name": "CVE-2025-38063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38063"
},
{
"name": "CVE-2025-68297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68297"
},
{
"name": "CVE-2024-40975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40975"
},
{
"name": "CVE-2025-68175",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68175"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2023-54227",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54227"
},
{
"name": "CVE-2023-46316",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46316"
},
{
"name": "CVE-2024-47866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47866"
},
{
"name": "CVE-2024-44970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44970"
},
{
"name": "CVE-2022-49476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49476"
},
{
"name": "CVE-2023-53855",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53855"
},
{
"name": "CVE-2026-23208",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23208"
},
{
"name": "CVE-2025-68804",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68804"
},
{
"name": "CVE-2025-39925",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39925"
},
{
"name": "CVE-2025-68769",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68769"
},
{
"name": "CVE-2024-50286",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50286"
},
{
"name": "CVE-2025-40139",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40139"
},
{
"name": "CVE-2025-68794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68794"
},
{
"name": "CVE-2025-21768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21768"
},
{
"name": "CVE-2022-48667",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48667"
},
{
"name": "CVE-2025-69419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69419"
},
{
"name": "CVE-2024-56744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56744"
},
{
"name": "CVE-2025-38491",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38491"
},
{
"name": "CVE-2026-3783",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3783"
},
{
"name": "CVE-2022-49161",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49161"
},
{
"name": "CVE-2021-21240",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21240"
},
{
"name": "CVE-2022-48771",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48771"
},
{
"name": "CVE-2025-37961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37961"
},
{
"name": "CVE-2025-23131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23131"
},
{
"name": "CVE-2024-27400",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27400"
},
{
"name": "CVE-2023-52485",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52485"
},
{
"name": "CVE-2025-40309",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40309"
},
{
"name": "CVE-2022-49997",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49997"
},
{
"name": "CVE-2022-49469",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49469"
},
{
"name": "CVE-2025-6075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6075"
},
{
"name": "CVE-2025-38408",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38408"
},
{
"name": "CVE-2026-23179",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23179"
},
{
"name": "CVE-2025-68334",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68334"
},
{
"name": "CVE-2025-40343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40343"
},
{
"name": "CVE-2025-38644",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38644"
},
{
"name": "CVE-2025-38692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38692"
},
{
"name": "CVE-2022-0480",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0480"
},
{
"name": "CVE-2025-68173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68173"
},
{
"name": "CVE-2024-49932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49932"
},
{
"name": "CVE-2026-23090",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23090"
},
{
"name": "CVE-2026-23035",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23035"
},
{
"name": "CVE-2023-53209",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53209"
},
{
"name": "CVE-2023-54253",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54253"
},
{
"name": "CVE-2025-38127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38127"
},
{
"name": "CVE-2025-22103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22103"
},
{
"name": "CVE-2025-1272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1272"
},
{
"name": "CVE-2025-21658",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21658"
},
{
"name": "CVE-2022-49651",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49651"
},
{
"name": "CVE-2025-68307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68307"
},
{
"name": "CVE-2025-40308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40308"
},
{
"name": "CVE-2024-26770",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26770"
},
{
"name": "CVE-2023-54324",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54324"
},
{
"name": "CVE-2024-27041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27041"
},
{
"name": "CVE-2025-36184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36184"
},
{
"name": "CVE-2026-3195",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3195"
},
{
"name": "CVE-2025-37743",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37743"
},
{
"name": "CVE-2025-40005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40005"
},
{
"name": "CVE-2025-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37920"
},
{
"name": "CVE-2024-56326",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56326"
},
{
"name": "CVE-2023-26242",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26242"
},
{
"name": "CVE-2025-58185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58185"
},
{
"name": "CVE-2025-40315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40315"
},
{
"name": "CVE-2023-52673",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52673"
},
{
"name": "CVE-2024-56722",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56722"
},
{
"name": "CVE-2021-33113",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33113"
},
{
"name": "CVE-2022-48668",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48668"
},
{
"name": "CVE-2024-27418",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27418"
},
{
"name": "CVE-2025-68231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68231"
},
{
"name": "CVE-2021-22930",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22930"
},
{
"name": "CVE-2025-14177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14177"
},
{
"name": "CVE-2026-23064",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23064"
},
{
"name": "CVE-2025-38591",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38591"
},
{
"name": "CVE-2025-68806",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68806"
},
{
"name": "CVE-2022-50322",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50322"
},
{
"name": "CVE-2023-50782",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50782"
},
{
"name": "CVE-2022-27635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27635"
},
{
"name": "CVE-2025-71098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71098"
},
{
"name": "CVE-2024-49922",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49922"
},
{
"name": "CVE-2020-12317",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12317"
},
{
"name": "CVE-2025-61731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61731"
},
{
"name": "CVE-2025-40251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40251"
},
{
"name": "CVE-2024-42128",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42128"
},
{
"name": "CVE-2025-71078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71078"
},
{
"name": "CVE-2024-49909",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49909"
},
{
"name": "CVE-2025-40355",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40355"
},
{
"name": "CVE-2021-42771",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42771"
},
{
"name": "CVE-2026-2391",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2391"
},
{
"name": "CVE-2021-4095",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4095"
},
{
"name": "CVE-2022-50240",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50240"
},
{
"name": "CVE-2025-40054",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40054"
},
{
"name": "CVE-2024-45015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45015"
},
{
"name": "CVE-2025-68184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68184"
},
{
"name": "CVE-2024-36357",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36357"
},
{
"name": "CVE-2025-71074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71074"
},
{
"name": "CVE-2025-38673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38673"
},
{
"name": "CVE-2025-40107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40107"
},
{
"name": "CVE-2025-11234",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11234"
},
{
"name": "CVE-2025-71083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71083"
},
{
"name": "CVE-2026-23061",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23061"
},
{
"name": "CVE-2023-53447",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53447"
},
{
"name": "CVE-2024-46754",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46754"
},
{
"name": "CVE-2021-0161",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0161"
},
{
"name": "CVE-2018-1121",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1121"
},
{
"name": "CVE-2022-49547",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49547"
},
{
"name": "CVE-2025-66863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66863"
},
{
"name": "CVE-2025-0622",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0622"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2024-26757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26757"
},
{
"name": "CVE-2024-49899",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49899"
},
{
"name": "CVE-2022-49484",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49484"
},
{
"name": "CVE-2024-40900",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40900"
},
{
"name": "CVE-2024-46748",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46748"
},
{
"name": "CVE-2025-68813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68813"
},
{
"name": "CVE-2024-50164",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50164"
},
{
"name": "CVE-2026-27137",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27137"
},
{
"name": "CVE-2023-53248",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53248"
},
{
"name": "CVE-2024-56788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56788"
},
{
"name": "CVE-2016-8660",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8660"
},
{
"name": "CVE-2024-26691",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26691"
},
{
"name": "CVE-2026-23047",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23047"
},
{
"name": "CVE-2025-22121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22121"
},
{
"name": "CVE-2024-1975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1975"
},
{
"name": "CVE-2025-38215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38215"
},
{
"name": "CVE-2025-7519",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7519"
},
{
"name": "CVE-2023-53491",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53491"
},
{
"name": "CVE-2025-68365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68365"
},
{
"name": "CVE-2024-57804",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57804"
},
{
"name": "CVE-2024-49908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49908"
},
{
"name": "CVE-2025-68265",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68265"
},
{
"name": "CVE-2024-50048",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50048"
},
{
"name": "CVE-2026-28421",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28421"
},
{
"name": "CVE-2026-23119",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23119"
},
{
"name": "CVE-2025-37943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37943"
},
{
"name": "CVE-2025-21918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21918"
},
{
"name": "CVE-2025-37745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37745"
},
{
"name": "CVE-2025-71085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71085"
},
{
"name": "CVE-2026-27171",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27171"
},
{
"name": "CVE-2022-50811",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50811"
},
{
"name": "CVE-2025-13837",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13837"
},
{
"name": "CVE-2023-4133",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4133"
},
{
"name": "CVE-2024-50183",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50183"
},
{
"name": "CVE-2025-38734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38734"
},
{
"name": "CVE-2023-53366",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53366"
},
{
"name": "CVE-2022-49910",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49910"
},
{
"name": "CVE-2024-27062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27062"
},
{
"name": "CVE-2022-49203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49203"
},
{
"name": "CVE-2024-40918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40918"
},
{
"name": "CVE-2024-27032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27032"
},
{
"name": "CVE-2022-50236",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50236"
},
{
"name": "CVE-2024-35932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35932"
},
{
"name": "CVE-2024-35839",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35839"
},
{
"name": "CVE-2025-68344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68344"
},
{
"name": "CVE-2026-23137",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23137"
},
{
"name": "CVE-2025-40347",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40347"
},
{
"name": "CVE-2025-71154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71154"
},
{
"name": "CVE-2025-37882",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37882"
},
{
"name": "CVE-2024-35971",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35971"
},
{
"name": "CVE-2024-46762",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46762"
},
{
"name": "CVE-2023-34983",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34983"
},
{
"name": "CVE-2024-35868",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35868"
},
{
"name": "CVE-2023-53323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53323"
},
{
"name": "CVE-2026-3731",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3731"
},
{
"name": "CVE-2025-40198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40198"
},
{
"name": "CVE-2024-0760",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0760"
},
{
"name": "CVE-2025-39942",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39942"
},
{
"name": "CVE-2025-68310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68310"
},
{
"name": "CVE-2026-23222",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23222"
},
{
"name": "CVE-2025-68229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68229"
},
{
"name": "CVE-2023-52857",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52857"
},
{
"name": "CVE-2024-42107",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42107"
},
{
"name": "CVE-2025-68257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68257"
},
{
"name": "CVE-2025-39929",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39929"
},
{
"name": "CVE-2022-50304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50304"
},
{
"name": "CVE-2026-23226",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23226"
},
{
"name": "CVE-2020-26146",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26146"
},
{
"name": "CVE-2024-43844",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43844"
},
{
"name": "CVE-2023-52920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52920"
},
{
"name": "CVE-2023-52590",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52590"
},
{
"name": "CVE-2025-71084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71084"
},
{
"name": "CVE-2024-22025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22025"
},
{
"name": "CVE-2026-23049",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23049"
},
{
"name": "CVE-2025-68321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68321"
},
{
"name": "CVE-2021-0072",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0072"
},
{
"name": "CVE-2025-40190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40190"
},
{
"name": "CVE-2025-69652",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69652"
},
{
"name": "CVE-2025-21635",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21635"
},
{
"name": "CVE-2025-37924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37924"
},
{
"name": "CVE-2022-40133",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40133"
},
{
"name": "CVE-2020-26143",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26143"
},
{
"name": "CVE-2025-21712",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21712"
},
{
"name": "CVE-2025-38353",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38353"
},
{
"name": "CVE-2025-36009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36009"
},
{
"name": "CVE-2019-0154",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0154"
},
{
"name": "CVE-2024-57982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57982"
},
{
"name": "CVE-2023-52761",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52761"
},
{
"name": "CVE-2022-49773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49773"
},
{
"name": "CVE-2023-53609",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53609"
},
{
"name": "CVE-2023-53478",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53478"
},
{
"name": "CVE-2024-42117",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42117"
},
{
"name": "CVE-2025-23160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23160"
},
{
"name": "CVE-2023-53682",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53682"
},
{
"name": "CVE-2026-23229",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23229"
},
{
"name": "CVE-2025-40311",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40311"
},
{
"name": "CVE-2025-54770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54770"
},
{
"name": "CVE-2026-3442",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3442"
},
{
"name": "CVE-2024-58238",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58238"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2025-68814",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68814"
},
{
"name": "CVE-2025-22039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22039"
},
{
"name": "CVE-2025-37842",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37842"
},
{
"name": "CVE-2025-39933",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39933"
},
{
"name": "CVE-2025-40237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40237"
},
{
"name": "CVE-2022-49722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49722"
},
{
"name": "CVE-2026-23745",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23745"
},
{
"name": "CVE-2025-68780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68780"
},
{
"name": "CVE-2024-35945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35945"
},
{
"name": "CVE-2025-39990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39990"
},
{
"name": "CVE-2025-15467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15467"
},
{
"name": "CVE-2025-71081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71081"
},
{
"name": "CVE-2023-53780",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53780"
},
{
"name": "CVE-2020-35501",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35501"
},
{
"name": "CVE-2024-58251",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58251"
},
{
"name": "CVE-2025-38710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38710"
},
{
"name": "CVE-2025-9820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9820"
},
{
"name": "CVE-2023-52624",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52624"
},
{
"name": "CVE-2024-56557",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56557"
},
{
"name": "CVE-2022-49699",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49699"
},
{
"name": "CVE-2022-50700",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50700"
},
{
"name": "CVE-2023-52632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52632"
},
{
"name": "CVE-2024-46836",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46836"
},
{
"name": "CVE-2026-23101",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23101"
},
{
"name": "CVE-2026-23099",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23099"
},
{
"name": "CVE-2024-38556",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38556"
},
{
"name": "CVE-2025-1180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1180"
},
{
"name": "CVE-2025-38060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38060"
},
{
"name": "CVE-2022-48929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48929"
},
{
"name": "CVE-2025-55130",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55130"
},
{
"name": "CVE-2025-36070",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36070"
},
{
"name": "CVE-2024-46820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46820"
},
{
"name": "CVE-2025-39770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39770"
},
{
"name": "CVE-2025-38105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38105"
},
{
"name": "CVE-2025-37744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37744"
},
{
"name": "CVE-2025-38705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38705"
},
{
"name": "CVE-2023-53198",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53198"
},
{
"name": "CVE-2023-53846",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53846"
},
{
"name": "CVE-2025-71121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71121"
},
{
"name": "CVE-2024-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35942"
},
{
"name": "CVE-2022-1247",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1247"
},
{
"name": "CVE-2025-40333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40333"
},
{
"name": "CVE-2022-50234",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50234"
},
{
"name": "CVE-2025-38082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38082"
},
{
"name": "CVE-2025-37884",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37884"
},
{
"name": "CVE-2024-58054",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58054"
},
{
"name": "CVE-2024-49934",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49934"
},
{
"name": "CVE-2025-39750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39750"
},
{
"name": "CVE-2025-38022",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38022"
},
{
"name": "CVE-2026-23066",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23066"
},
{
"name": "CVE-2025-38562",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38562"
},
{
"name": "CVE-2023-4969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4969"
},
{
"name": "CVE-2024-50098",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50098"
},
{
"name": "CVE-2024-35946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35946"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2023-53789",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53789"
},
{
"name": "CVE-2022-49858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49858"
},
{
"name": "CVE-2025-39692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39692"
},
{
"name": "CVE-2024-35959",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35959"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2025-36428",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36428"
},
{
"name": "CVE-2023-53520",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53520"
},
{
"name": "CVE-2026-23085",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23085"
},
{
"name": "CVE-2023-52737",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52737"
},
{
"name": "CVE-2025-40360",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40360"
},
{
"name": "CVE-2026-23209",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23209"
},
{
"name": "CVE-2025-71136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71136"
},
{
"name": "CVE-2024-35803",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35803"
},
{
"name": "CVE-2025-22105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22105"
},
{
"name": "CVE-2024-8612",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8612"
},
{
"name": "CVE-2023-52586",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52586"
},
{
"name": "CVE-2025-40332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40332"
},
{
"name": "CVE-2021-46195",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46195"
},
{
"name": "CVE-2025-68354",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68354"
},
{
"name": "CVE-2025-68801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68801"
},
{
"name": "CVE-2021-33110",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33110"
},
{
"name": "CVE-2025-37834",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37834"
},
{
"name": "CVE-2025-21833",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21833"
},
{
"name": "CVE-2025-40082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40082"
},
{
"name": "CVE-2019-19378",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19378"
},
{
"name": "CVE-2026-23150",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23150"
},
{
"name": "CVE-2024-40972",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40972"
},
{
"name": "CVE-2025-61985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61985"
},
{
"name": "CVE-2025-71073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71073"
},
{
"name": "CVE-2025-38426",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38426"
},
{
"name": "CVE-2025-38436",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38436"
},
{
"name": "CVE-2024-36911",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36911"
},
{
"name": "CVE-2025-55131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55131"
},
{
"name": "CVE-2025-40104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40104"
},
{
"name": "CVE-2024-36917",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36917"
},
{
"name": "CVE-2025-38097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38097"
},
{
"name": "CVE-2026-23236",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23236"
},
{
"name": "CVE-2023-53068",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53068"
},
{
"name": "CVE-2025-22090",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22090"
},
{
"name": "CVE-2025-61919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61919"
},
{
"name": "CVE-2021-31615",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31615"
},
{
"name": "CVE-2024-1737",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1737"
},
{
"name": "CVE-2025-40097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40097"
},
{
"name": "CVE-2022-49932",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49932"
},
{
"name": "CVE-2022-25837",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25837"
},
{
"name": "CVE-2025-68258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68258"
},
{
"name": "CVE-2024-49939",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49939"
},
{
"name": "CVE-2025-38239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38239"
},
{
"name": "CVE-2024-49905",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49905"
},
{
"name": "CVE-2023-52831",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52831"
},
{
"name": "CVE-2023-53221",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53221"
},
{
"name": "CVE-2024-26719",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26719"
},
{
"name": "CVE-2022-44034",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44034"
},
{
"name": "CVE-2022-40897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
},
{
"name": "CVE-2023-53072",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53072"
},
{
"name": "CVE-2023-2007",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2007"
},
{
"name": "CVE-2022-37341",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37341"
},
{
"name": "CVE-2025-69648",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69648"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2024-50298",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50298"
},
{
"name": "CVE-2025-36424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36424"
},
{
"name": "CVE-2025-21915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21915"
},
{
"name": "CVE-2025-38590",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38590"
},
{
"name": "CVE-2024-46843",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46843"
},
{
"name": "CVE-2025-21792",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21792"
},
{
"name": "CVE-2023-54016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54016"
},
{
"name": "CVE-2025-36387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36387"
},
{
"name": "CVE-2025-38709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38709"
},
{
"name": "CVE-2024-58018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58018"
},
{
"name": "CVE-2023-4408",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4408"
},
{
"name": "CVE-2025-71235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71235"
},
{
"name": "CVE-2025-61771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61771"
},
{
"name": "CVE-2023-53602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53602"
},
{
"name": "CVE-2023-2828",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2828"
},
{
"name": "CVE-2023-54035",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54035"
},
{
"name": "CVE-2025-40322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40322"
},
{
"name": "CVE-2023-53867",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53867"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2025-61770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61770"
},
{
"name": "CVE-2025-37926",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37926"
},
{
"name": "CVE-2024-46715",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46715"
},
{
"name": "CVE-2025-38038",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38038"
},
{
"name": "CVE-2024-46802",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46802"
},
{
"name": "CVE-2025-39859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39859"
},
{
"name": "CVE-2025-40313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40313"
},
{
"name": "CVE-2023-52582",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52582"
},
{
"name": "CVE-2023-33053",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33053"
},
{
"name": "CVE-2025-1152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1152"
},
{
"name": "CVE-2026-24051",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24051"
},
{
"name": "CVE-2025-38015",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38015"
},
{
"name": "CVE-2024-26742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26742"
},
{
"name": "CVE-2025-38449",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38449"
},
{
"name": "CVE-2025-21714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21714"
},
{
"name": "CVE-2025-38261",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38261"
},
{
"name": "CVE-2024-36918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36918"
},
{
"name": "CVE-2025-37853",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37853"
},
{
"name": "CVE-2025-69644",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69644"
},
{
"name": "CVE-2022-49303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49303"
},
{
"name": "CVE-2025-38126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38126"
},
{
"name": "CVE-2023-46809",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46809"
},
{
"name": "CVE-2025-59465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59465"
},
{
"name": "CVE-2025-39763",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39763"
},
{
"name": "CVE-2025-21972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21972"
},
{
"name": "CVE-2023-54088",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54088"
},
{
"name": "CVE-2024-42320",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42320"
},
{
"name": "CVE-2025-38679",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38679"
},
{
"name": "CVE-2025-40271",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40271"
},
{
"name": "CVE-2024-53234",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53234"
},
{
"name": "CVE-2025-11961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11961"
},
{
"name": "CVE-2025-39877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39877"
},
{
"name": "CVE-2022-3114",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3114"
},
{
"name": "CVE-2023-52916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52916"
},
{
"name": "CVE-2025-38064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38064"
},
{
"name": "CVE-2026-22991",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22991"
},
{
"name": "CVE-2024-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35937"
},
{
"name": "CVE-2022-50628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50628"
},
{
"name": "CVE-2024-56718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56718"
},
{
"name": "CVE-2024-43824",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43824"
},
{
"name": "CVE-2025-39886",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39886"
},
{
"name": "CVE-2022-50350",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50350"
},
{
"name": "CVE-2025-21831",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21831"
},
{
"name": "CVE-2022-50721",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50721"
},
{
"name": "CVE-2022-50095",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50095"
},
{
"name": "CVE-2025-40073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40073"
},
{
"name": "CVE-2024-26662",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26662"
},
{
"name": "CVE-2026-3196",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3196"
},
{
"name": "CVE-2025-61662",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61662"
},
{
"name": "CVE-2025-8291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8291"
},
{
"name": "CVE-2025-68308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68308"
},
{
"name": "CVE-2024-50217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50217"
},
{
"name": "CVE-2021-0168",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0168"
},
{
"name": "CVE-2026-22795",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22795"
},
{
"name": "CVE-2022-50479",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50479"
},
{
"name": "CVE-2022-50583",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50583"
},
{
"name": "CVE-2025-37806",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37806"
},
{
"name": "CVE-2024-38554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38554"
},
{
"name": "CVE-2025-68822",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68822"
},
{
"name": "CVE-2025-40242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40242"
},
{
"name": "CVE-2023-0030",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0030"
},
{
"name": "CVE-2024-42110",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42110"
},
{
"name": "CVE-2025-37822",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37822"
},
{
"name": "CVE-2025-61727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61727"
},
{
"name": "CVE-2025-39838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39838"
},
{
"name": "CVE-2025-37820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37820"
},
{
"name": "CVE-2024-53179",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53179"
},
{
"name": "CVE-2024-57945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57945"
},
{
"name": "CVE-2023-54233",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54233"
},
{
"name": "CVE-2024-43899",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43899"
},
{
"name": "CVE-2025-21986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21986"
},
{
"name": "CVE-2019-15213",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15213"
},
{
"name": "CVE-2025-38234",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38234"
},
{
"name": "CVE-2022-49935",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49935"
},
{
"name": "CVE-2021-44532",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44532"
},
{
"name": "CVE-2025-38011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38011"
},
{
"name": "CVE-2022-49534",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49534"
},
{
"name": "CVE-2024-57974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57974"
},
{
"name": "CVE-2024-50012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50012"
},
{
"name": "CVE-2025-68190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68190"
},
{
"name": "CVE-2023-53010",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53010"
},
{
"name": "CVE-2024-35956",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35956"
},
{
"name": "CVE-2024-57888",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57888"
},
{
"name": "CVE-2025-65637",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-65637"
},
{
"name": "CVE-2024-35908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35908"
},
{
"name": "CVE-2023-54237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54237"
},
{
"name": "CVE-2025-37878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37878"
},
{
"name": "CVE-2023-53424",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53424"
},
{
"name": "CVE-2026-23207",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23207"
},
{
"name": "CVE-2025-40252",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40252"
},
{
"name": "CVE-2022-49134",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49134"
},
{
"name": "CVE-2025-21946",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21946"
},
{
"name": "CVE-2025-21838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21838"
},
{
"name": "CVE-2022-49333",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49333"
},
{
"name": "CVE-2023-53791",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53791"
},
{
"name": "CVE-2025-27111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27111"
},
{
"name": "CVE-2024-49994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49994"
},
{
"name": "CVE-2025-53859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53859"
},
{
"name": "CVE-2019-19814",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19814"
},
{
"name": "CVE-2022-49136",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49136"
},
{
"name": "CVE-2025-68255",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68255"
},
{
"name": "CVE-2025-47910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47910"
},
{
"name": "CVE-2023-54081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54081"
},
{
"name": "CVE-2024-36898",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36898"
},
{
"name": "CVE-2024-44962",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44962"
},
{
"name": "CVE-2025-68322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68322"
},
{
"name": "CVE-2024-35931",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35931"
},
{
"name": "CVE-2025-38702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38702"
},
{
"name": "CVE-2026-22980",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22980"
},
{
"name": "CVE-2026-23138",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23138"
},
{
"name": "CVE-2025-39927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39927"
},
{
"name": "CVE-2026-1703",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1703"
},
{
"name": "CVE-2023-26551",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26551"
},
{
"name": "CVE-2024-46857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46857"
},
{
"name": "CVE-2024-58013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58013"
},
{
"name": "CVE-2024-53210",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53210"
},
{
"name": "CVE-2023-54185",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54185"
},
{
"name": "CVE-2022-49342",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49342"
},
{
"name": "CVE-2015-8553",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8553"
},
{
"name": "CVE-2025-40277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40277"
},
{
"name": "CVE-2025-38250",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38250"
},
{
"name": "CVE-2024-36966",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36966"
},
{
"name": "CVE-2023-53332",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53332"
},
{
"name": "CVE-2024-35924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35924"
},
{
"name": "CVE-2024-58095",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58095"
},
{
"name": "CVE-2024-45010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45010"
},
{
"name": "CVE-2022-49471",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49471"
},
{
"name": "CVE-2025-68174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68174"
},
{
"name": "CVE-2022-48976",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48976"
},
{
"name": "CVE-2025-21751",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21751"
},
{
"name": "CVE-2023-53753",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53753"
},
{
"name": "CVE-2024-41074",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41074"
},
{
"name": "CVE-2026-23234",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23234"
},
{
"name": "CVE-2025-40272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40272"
},
{
"name": "CVE-2024-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50106"
},
{
"name": "CVE-2025-23162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23162"
},
{
"name": "CVE-2026-23133",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23133"
},
{
"name": "CVE-2025-71093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71093"
},
{
"name": "CVE-2025-46727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46727"
},
{
"name": "CVE-2017-13694",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13694"
},
{
"name": "CVE-2025-71102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71102"
},
{
"name": "CVE-2026-23212",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23212"
},
{
"name": "CVE-2013-7445",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-7445"
},
{
"name": "CVE-2026-23170",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23170"
},
{
"name": "CVE-2023-52701",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52701"
},
{
"name": "CVE-2024-49906",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49906"
},
{
"name": "CVE-2024-26647",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26647"
},
{
"name": "CVE-2025-68759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68759"
},
{
"name": "CVE-2024-47809",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47809"
},
{
"name": "CVE-2026-23204",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23204"
},
{
"name": "CVE-2022-49317",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49317"
},
{
"name": "CVE-2026-23019",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23019"
},
{
"name": "CVE-2018-12928",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12928"
},
{
"name": "CVE-2025-71188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71188"
},
{
"name": "CVE-2023-38552",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38552"
},
{
"name": "CVE-2024-40989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40989"
},
{
"name": "CVE-2024-56607",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56607"
},
{
"name": "CVE-2025-40345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40345"
},
{
"name": "CVE-2026-27142",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27142"
},
{
"name": "CVE-2024-49904",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49904"
},
{
"name": "CVE-2023-53671",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53671"
},
{
"name": "CVE-2025-40354",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40354"
},
{
"name": "CVE-2024-26938",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26938"
},
{
"name": "CVE-2026-28417",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28417"
},
{
"name": "CVE-2025-37931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37931"
},
{
"name": "CVE-2024-35999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35999"
},
{
"name": "CVE-2023-29942",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29942"
},
{
"name": "CVE-2026-23125",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23125"
},
{
"name": "CVE-2026-0966",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0966"
},
{
"name": "CVE-2022-48633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48633"
},
{
"name": "CVE-2022-3238",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3238"
},
{
"name": "CVE-2024-38557",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38557"
},
{
"name": "CVE-2026-22185",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22185"
},
{
"name": "CVE-2023-53781",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53781"
},
{
"name": "CVE-2023-53584",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53584"
},
{
"name": "CVE-2024-57809",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57809"
},
{
"name": "CVE-2025-38057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38057"
},
{
"name": "CVE-2025-68733",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68733"
},
{
"name": "CVE-2024-56719",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56719"
},
{
"name": "CVE-2022-50418",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50418"
},
{
"name": "CVE-2023-53438",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53438"
},
{
"name": "CVE-2025-47906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47906"
},
{
"name": "CVE-2023-53460",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53460"
},
{
"name": "CVE-2026-23214",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23214"
},
{
"name": "CVE-2024-52559",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52559"
},
{
"name": "CVE-2025-68188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68188"
},
{
"name": "CVE-2025-40269",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40269"
},
{
"name": "CVE-2024-56671",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56671"
},
{
"name": "CVE-2025-68335",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68335"
},
{
"name": "CVE-2025-71079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71079"
},
{
"name": "CVE-2025-62626",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62626"
},
{
"name": "CVE-2025-39940",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39940"
},
{
"name": "CVE-2023-52751",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52751"
},
{
"name": "CVE-2022-49562",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49562"
},
{
"name": "CVE-2025-37861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37861"
},
{
"name": "CVE-2023-53483",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53483"
},
{
"name": "CVE-2023-53673",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53673"
},
{
"name": "CVE-2025-37938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37938"
},
{
"name": "CVE-2025-37746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37746"
},
{
"name": "CVE-2022-38076",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38076"
},
{
"name": "CVE-2025-38368",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38368"
},
{
"name": "CVE-2026-23178",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23178"
},
{
"name": "CVE-2025-59375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59375"
},
{
"name": "CVE-2025-31133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31133"
},
{
"name": "CVE-2026-22997",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22997"
},
{
"name": "CVE-2024-56368",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56368"
},
{
"name": "CVE-2025-40075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40075"
},
{
"name": "CVE-2022-49172",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49172"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2024-40979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40979"
},
{
"name": "CVE-2025-39977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39977"
},
{
"name": "CVE-2025-38331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38331"
},
{
"name": "CVE-2026-23240",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23240"
},
{
"name": "CVE-2025-68330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68330"
},
{
"name": "CVE-2026-23228",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23228"
},
{
"name": "CVE-2024-49945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49945"
},
{
"name": "CVE-2022-44033",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44033"
},
{
"name": "CVE-2024-56757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56757"
},
{
"name": "CVE-2023-53662",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53662"
},
{
"name": "CVE-2025-38069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38069"
},
{
"name": "CVE-2022-49750",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49750"
},
{
"name": "CVE-2023-53707",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53707"
},
{
"name": "CVE-2023-53115",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53115"
},
{
"name": "CVE-2025-71196",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71196"
},
{
"name": "CVE-2025-21645",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21645"
},
{
"name": "CVE-2023-54107",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54107"
},
{
"name": "CVE-2022-48646",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48646"
},
{
"name": "CVE-2024-43912",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43912"
},
{
"name": "CVE-2024-35808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35808"
},
{
"name": "CVE-2024-58012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58012"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2025-61663",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61663"
},
{
"name": "CVE-2025-68772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68772"
},
{
"name": "CVE-2024-49891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49891"
},
{
"name": "CVE-2024-36948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36948"
},
{
"name": "CVE-2022-48887",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48887"
},
{
"name": "CVE-2024-40977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40977"
},
{
"name": "CVE-2024-26948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26948"
},
{
"name": "CVE-2023-53370",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53370"
},
{
"name": "CVE-2024-53187",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53187"
},
{
"name": "CVE-2023-45929",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45929"
},
{
"name": "CVE-2025-68343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68343"
},
{
"name": "CVE-2025-66382",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66382"
},
{
"name": "CVE-2024-57795",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57795"
},
{
"name": "CVE-2025-37855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37855"
},
{
"name": "CVE-2025-21816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21816"
},
{
"name": "CVE-2021-33115",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33115"
},
{
"name": "CVE-2025-21780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21780"
},
{
"name": "CVE-2020-26559",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26559"
},
{
"name": "CVE-2024-12705",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12705"
},
{
"name": "CVE-2025-69421",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69421"
},
{
"name": "CVE-2020-26140",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26140"
},
{
"name": "CVE-2024-39508",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39508"
},
{
"name": "CVE-2026-23191",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23191"
},
{
"name": "CVE-2026-32249",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32249"
},
{
"name": "CVE-2025-37899",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37899"
},
{
"name": "CVE-2026-23078",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23078"
},
{
"name": "CVE-2025-40362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40362"
},
{
"name": "CVE-2025-68201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68201"
},
{
"name": "CVE-2024-43831",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43831"
},
{
"name": "CVE-2023-30630",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30630"
},
{
"name": "CVE-2025-40289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40289"
},
{
"name": "CVE-2026-23169",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23169"
},
{
"name": "CVE-2025-38330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38330"
},
{
"name": "CVE-2025-58188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58188"
},
{
"name": "CVE-2017-13693",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13693"
},
{
"name": "CVE-2025-68768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68768"
},
{
"name": "CVE-2024-50284",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50284"
},
{
"name": "CVE-2022-49306",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49306"
},
{
"name": "CVE-2024-49898",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49898"
},
{
"name": "CVE-2025-36423",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36423"
},
{
"name": "CVE-2022-49622",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49622"
},
{
"name": "CVE-2025-68785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68785"
},
{
"name": "CVE-2024-50211",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50211"
},
{
"name": "CVE-2025-38507",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38507"
},
{
"name": "CVE-2022-50284",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50284"
},
{
"name": "CVE-2025-39989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39989"
},
{
"name": "CVE-2023-6240",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6240"
},
{
"name": "CVE-2025-38014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38014"
},
{
"name": "CVE-2025-22028",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22028"
},
{
"name": "CVE-2024-41008",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41008"
},
{
"name": "CVE-2024-27035",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27035"
},
{
"name": "CVE-2023-53218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53218"
},
{
"name": "CVE-2022-25836",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25836"
},
{
"name": "CVE-2024-37354",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37354"
},
{
"name": "CVE-2025-68808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68808"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2025-29934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29934"
},
{
"name": "CVE-2024-27005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27005"
},
{
"name": "CVE-2025-68223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68223"
},
{
"name": "CVE-2022-49133",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49133"
},
{
"name": "CVE-2024-36951",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36951"
},
{
"name": "CVE-2025-68783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68783"
},
{
"name": "CVE-2025-71147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71147"
},
{
"name": "CVE-2025-38438",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38438"
},
{
"name": "CVE-2025-40032",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40032"
},
{
"name": "CVE-2023-26555",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26555"
},
{
"name": "CVE-2023-1193",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1193"
},
{
"name": "CVE-2025-71220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71220"
},
{
"name": "CVE-2024-46806",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46806"
},
{
"name": "CVE-2022-50073",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50073"
},
{
"name": "CVE-2025-68724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68724"
},
{
"name": "CVE-2025-5278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5278"
},
{
"name": "CVE-2026-23103",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23103"
},
{
"name": "CVE-2026-23074",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23074"
},
{
"name": "CVE-2025-68786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68786"
},
{
"name": "CVE-2025-39732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39732"
},
{
"name": "CVE-2022-50393",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50393"
},
{
"name": "CVE-2025-68779",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68779"
},
{
"name": "CVE-2024-56433",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
},
{
"name": "CVE-2025-21819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21819"
},
{
"name": "CVE-2025-48514",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48514"
},
{
"name": "CVE-2024-41030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41030"
},
{
"name": "CVE-2025-71199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71199"
},
{
"name": "CVE-2024-47664",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47664"
},
{
"name": "CVE-2024-36915",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36915"
},
{
"name": "CVE-2026-25749",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25749"
},
{
"name": "CVE-2024-49504",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49504"
},
{
"name": "CVE-2025-38118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38118"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2023-53367",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53367"
},
{
"name": "CVE-2022-50500",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50500"
},
{
"name": "CVE-2019-14899",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14899"
},
{
"name": "CVE-2022-29526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
},
{
"name": "CVE-2024-53098",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53098"
},
{
"name": "CVE-2025-68797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68797"
},
{
"name": "CVE-2024-49968",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49968"
},
{
"name": "CVE-2025-68358",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68358"
},
{
"name": "CVE-2025-40206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40206"
},
{
"name": "CVE-2026-23180",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23180"
},
{
"name": "CVE-2021-0164",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0164"
},
{
"name": "CVE-2026-26958",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26958"
},
{
"name": "CVE-2024-46870",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46870"
},
{
"name": "CVE-2022-49178",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49178"
},
{
"name": "CVE-2024-22195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22195"
},
{
"name": "CVE-2023-23931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23931"
},
{
"name": "CVE-2024-49929",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49929"
},
{
"name": "CVE-2025-40257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40257"
},
{
"name": "CVE-2023-53748",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53748"
},
{
"name": "CVE-2024-26740",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26740"
},
{
"name": "CVE-2022-49173",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49173"
},
{
"name": "CVE-2024-45781",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45781"
},
{
"name": "CVE-2025-71125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71125"
},
{
"name": "CVE-2025-21947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21947"
},
{
"name": "CVE-2024-53056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53056"
},
{
"name": "CVE-2022-50551",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50551"
},
{
"name": "CVE-2026-26269",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26269"
},
{
"name": "CVE-2024-43872",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43872"
},
{
"name": "CVE-2025-71108",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71108"
},
{
"name": "CVE-2022-49401",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49401"
},
{
"name": "CVE-2025-71069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71069"
},
{
"name": "CVE-2025-68312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68312"
},
{
"name": "CVE-2025-68284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68284"
},
{
"name": "CVE-2025-68194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68194"
},
{
"name": "CVE-2023-52939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52939"
},
{
"name": "CVE-2024-14027",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-14027"
},
{
"name": "CVE-2025-38269",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38269"
},
{
"name": "CVE-2025-69649",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69649"
},
{
"name": "CVE-2024-53175",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53175"
},
{
"name": "CVE-2025-21734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21734"
},
{
"name": "CVE-2024-49859",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49859"
},
{
"name": "CVE-2025-40336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40336"
},
{
"name": "CVE-2025-37945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37945"
},
{
"name": "CVE-2025-71195",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71195"
},
{
"name": "CVE-2022-49766",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49766"
},
{
"name": "CVE-2025-6141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6141"
},
{
"name": "CVE-2025-22043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22043"
},
{
"name": "CVE-2024-49569",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49569"
},
{
"name": "CVE-2025-61984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61984"
},
{
"name": "CVE-2023-52569",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52569"
},
{
"name": "CVE-2024-56609",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56609"
},
{
"name": "CVE-2022-49940",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49940"
},
{
"name": "CVE-2026-23083",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23083"
},
{
"name": "CVE-2025-38422",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38422"
},
{
"name": "CVE-2024-56611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56611"
},
{
"name": "CVE-2025-21927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21927"
},
{
"name": "CVE-2026-23088",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23088"
},
{
"name": "CVE-2020-25743",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25743"
},
{
"name": "CVE-2022-50167",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50167"
},
{
"name": "CVE-2025-68183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68183"
},
{
"name": "CVE-2026-27704",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27704"
},
{
"name": "CVE-2022-48064",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48064"
},
{
"name": "CVE-2023-45896",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45896"
},
{
"name": "CVE-2025-37903",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37903"
},
{
"name": "CVE-2025-68161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68161"
},
{
"name": "CVE-2025-68774",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68774"
},
{
"name": "CVE-2024-49940",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49940"
},
{
"name": "CVE-2025-40263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40263"
},
{
"name": "CVE-2021-3735",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3735"
},
{
"name": "CVE-2025-40353",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40353"
},
{
"name": "CVE-2024-46861",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46861"
},
{
"name": "CVE-2025-40222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40222"
},
{
"name": "CVE-2022-50634",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50634"
},
{
"name": "CVE-2025-52881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52881"
},
{
"name": "CVE-2025-54514",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54514"
},
{
"name": "CVE-2025-71202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71202"
},
{
"name": "CVE-2015-7837",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7837"
},
{
"name": "CVE-2025-0677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0677"
},
{
"name": "CVE-2024-45780",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45780"
},
{
"name": "CVE-2024-46749",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46749"
},
{
"name": "CVE-2022-50492",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50492"
},
{
"name": "CVE-2024-49888",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49888"
},
{
"name": "CVE-2022-50406",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50406"
},
{
"name": "CVE-2023-26552",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26552"
},
{
"name": "CVE-2024-49921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49921"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2026-23108",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23108"
},
{
"name": "CVE-2025-71180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71180"
},
{
"name": "CVE-2025-38232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38232"
},
{
"name": "CVE-2025-68244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68244"
},
{
"name": "CVE-2025-59691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59691"
},
{
"name": "CVE-2024-46830",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46830"
},
{
"name": "CVE-2023-52481",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52481"
},
{
"name": "CVE-2023-52888",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52888"
},
{
"name": "CVE-2025-22057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22057"
},
{
"name": "CVE-2024-47666",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47666"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2025-40278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40278"
},
{
"name": "CVE-2023-0160",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0160"
},
{
"name": "CVE-2024-50056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50056"
},
{
"name": "CVE-2025-71194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71194"
},
{
"name": "CVE-2026-1788",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1788"
},
{
"name": "CVE-2023-53721",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53721"
},
{
"name": "CVE-2025-22113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22113"
},
{
"name": "CVE-2025-40342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40342"
},
{
"name": "CVE-2022-50256",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50256"
},
{
"name": "CVE-2024-42091",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42091"
},
{
"name": "CVE-2024-27983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27983"
},
{
"name": "CVE-2025-37907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37907"
},
{
"name": "CVE-2024-38625",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38625"
},
{
"name": "CVE-2025-23085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23085"
},
{
"name": "CVE-2026-22796",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22796"
},
{
"name": "CVE-2023-4010",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4010"
},
{
"name": "CVE-2025-38425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38425"
},
{
"name": "CVE-2024-46727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46727"
},
{
"name": "CVE-2023-54028",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54028"
},
{
"name": "CVE-2024-42129",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42129"
},
{
"name": "CVE-2023-54105",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54105"
},
{
"name": "CVE-2018-17977",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17977"
},
{
"name": "CVE-2019-1010204",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1010204"
},
{
"name": "CVE-2023-53992",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53992"
},
{
"name": "CVE-2026-26960",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26960"
},
{
"name": "CVE-2025-40210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40210"
},
{
"name": "CVE-2022-50354",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50354"
},
{
"name": "CVE-2025-61724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61724"
},
{
"name": "CVE-2026-22999",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22999"
},
{
"name": "CVE-2025-21812",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21812"
},
{
"name": "CVE-2025-71082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71082"
},
{
"name": "CVE-2025-12801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12801"
},
{
"name": "CVE-2024-58015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58015"
},
{
"name": "CVE-2026-23068",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23068"
},
{
"name": "CVE-2024-41079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41079"
},
{
"name": "CVE-2025-68765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68765"
},
{
"name": "CVE-2026-23089",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23089"
},
{
"name": "CVE-2024-43823",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43823"
},
{
"name": "CVE-2023-52589",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52589"
},
{
"name": "CVE-2022-41848",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41848"
},
{
"name": "CVE-2026-23216",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23216"
},
{
"name": "CVE-2023-53434",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53434"
},
{
"name": "CVE-2023-29935",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29935"
},
{
"name": "CVE-2023-35061",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35061"
},
{
"name": "CVE-2025-71132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71132"
},
{
"name": "CVE-2025-71225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71225"
},
{
"name": "CVE-2026-21636",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21636"
},
{
"name": "CVE-2026-23239",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23239"
},
{
"name": "CVE-2021-0172",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0172"
},
{
"name": "CVE-2024-47662",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47662"
},
{
"name": "CVE-2018-12930",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12930"
},
{
"name": "CVE-2026-23071",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23071"
},
{
"name": "CVE-2024-49970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49970"
},
{
"name": "CVE-2024-41067",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41067"
},
{
"name": "CVE-2024-26844",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26844"
},
{
"name": "CVE-2025-23141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23141"
},
{
"name": "CVE-2026-23056",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23056"
},
{
"name": "CVE-2025-40193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40193"
},
{
"name": "CVE-2023-32644",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32644"
},
{
"name": "CVE-2025-71077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71077"
},
{
"name": "CVE-2025-21908",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21908"
},
{
"name": "CVE-2024-46681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46681"
},
{
"name": "CVE-2024-36927",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36927"
},
{
"name": "CVE-2025-61732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61732"
},
{
"name": "CVE-2025-61723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61723"
},
{
"name": "CVE-2025-9232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9232"
},
{
"name": "CVE-2025-40012",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40012"
},
{
"name": "CVE-2025-40279",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40279"
},
{
"name": "CVE-2026-0964",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0964"
},
{
"name": "CVE-2025-68328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68328"
},
{
"name": "CVE-2023-53178",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53178"
},
{
"name": "CVE-2024-47141",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47141"
},
{
"name": "CVE-2024-8354",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8354"
},
{
"name": "CVE-2023-54323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54323"
},
{
"name": "CVE-2025-37952",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37952"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2025-0689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0689"
},
{
"name": "CVE-2022-50316",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50316"
},
{
"name": "CVE-2023-31347",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31347"
},
{
"name": "CVE-2025-40084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40084"
},
{
"name": "CVE-2025-22111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22111"
},
{
"name": "CVE-2023-53657",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53657"
},
{
"name": "CVE-2024-49915",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49915"
},
{
"name": "CVE-2026-23063",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23063"
},
{
"name": "CVE-2025-55132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55132"
},
{
"name": "CVE-2023-52732",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52732"
},
{
"name": "CVE-2022-49759",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49759"
},
{
"name": "CVE-2025-61795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61795"
},
{
"name": "CVE-2026-23073",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23073"
},
{
"name": "CVE-2022-49167",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49167"
},
{
"name": "CVE-2025-68311",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68311"
},
{
"name": "CVE-2026-27903",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27903"
},
{
"name": "CVE-2023-54023",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54023"
},
{
"name": "CVE-2024-27056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27056"
},
{
"name": "CVE-2023-31082",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31082"
},
{
"name": "CVE-2024-41088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41088"
},
{
"name": "CVE-2025-0690",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0690"
},
{
"name": "CVE-2025-71114",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71114"
},
{
"name": "CVE-2023-53052",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53052"
},
{
"name": "CVE-2026-23058",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23058"
},
{
"name": "CVE-2022-49234",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49234"
},
{
"name": "CVE-2022-50163",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50163"
},
{
"name": "CVE-2024-36922",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36922"
},
{
"name": "CVE-2025-71067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71067"
},
{
"name": "CVE-2024-49919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49919"
},
{
"name": "CVE-2026-23238",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23238"
},
{
"name": "CVE-2025-71182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71182"
},
{
"name": "CVE-2020-26556",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26556"
},
{
"name": "CVE-2025-46394",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46394"
},
{
"name": "CVE-2025-66471",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66471"
},
{
"name": "CVE-2026-23038",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23038"
},
{
"name": "CVE-2025-40341",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40341"
},
{
"name": "CVE-2025-38409",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38409"
},
{
"name": "CVE-2021-3826",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3826"
},
{
"name": "CVE-2024-26699",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26699"
},
{
"name": "CVE-2024-57876",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57876"
},
{
"name": "CVE-2024-58019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58019"
},
{
"name": "CVE-2026-25679",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25679"
},
{
"name": "CVE-2026-22990",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22990"
},
{
"name": "CVE-2025-14017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14017"
},
{
"name": "CVE-2022-50390",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50390"
},
{
"name": "CVE-2026-23000",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23000"
},
{
"name": "CVE-2026-21441",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21441"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2025-71186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71186"
},
{
"name": "CVE-2024-53220",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53220"
},
{
"name": "CVE-2026-23176",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23176"
},
{
"name": "CVE-2023-53539",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53539"
},
{
"name": "CVE-2025-13836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13836"
},
{
"name": "CVE-2025-40338",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40338"
},
{
"name": "CVE-2025-68821",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68821"
},
{
"name": "CVE-2025-31648",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31648"
},
{
"name": "CVE-2025-0678",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0678"
},
{
"name": "CVE-2024-41075",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41075"
},
{
"name": "CVE-2026-23026",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23026"
},
{
"name": "CVE-2024-56674",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56674"
},
{
"name": "CVE-2024-27982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27982"
},
{
"name": "CVE-2025-40195",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40195"
},
{
"name": "CVE-2024-31884",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-31884"
},
{
"name": "CVE-2025-21976",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21976"
},
{
"name": "CVE-2019-1563",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1563"
},
{
"name": "CVE-2026-1002",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1002"
},
{
"name": "CVE-2026-23128",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23128"
},
{
"name": "CVE-2024-57975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57975"
},
{
"name": "CVE-2023-53574",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53574"
},
{
"name": "CVE-2022-50166",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50166"
},
{
"name": "CVE-2025-61725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61725"
},
{
"name": "CVE-2025-68325",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68325"
},
{
"name": "CVE-2025-71190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71190"
},
{
"name": "CVE-2024-56738",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56738"
},
{
"name": "CVE-2022-50778",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50778"
},
{
"name": "CVE-2024-42067",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42067"
},
{
"name": "CVE-2022-49971",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49971"
},
{
"name": "CVE-2025-71089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71089"
},
{
"name": "CVE-2025-21693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21693"
},
{
"name": "CVE-2025-71203",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71203"
},
{
"name": "CVE-2024-56657",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56657"
},
{
"name": "CVE-2025-39789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39789"
},
{
"name": "CVE-2022-49124",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49124"
},
{
"name": "CVE-2024-49901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49901"
},
{
"name": "CVE-2023-52700",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52700"
},
{
"name": "CVE-2024-56583",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56583"
},
{
"name": "CVE-2022-50195",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50195"
},
{
"name": "CVE-2025-40358",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40358"
},
{
"name": "CVE-2024-40998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40998"
},
{
"name": "CVE-2024-56712",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56712"
},
{
"name": "CVE-2025-68318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68318"
},
{
"name": "CVE-2022-49980",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49980"
},
{
"name": "CVE-2023-52634",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52634"
},
{
"name": "CVE-2025-22104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22104"
},
{
"name": "CVE-2022-2795",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2795"
},
{
"name": "CVE-2025-62526",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62526"
},
{
"name": "CVE-2024-49918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49918"
},
{
"name": "CVE-2025-68296",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68296"
},
{
"name": "CVE-2023-53785",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53785"
},
{
"name": "CVE-2024-45776",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45776"
},
{
"name": "CVE-2022-50090",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50090"
},
{
"name": "CVE-2025-40340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40340"
},
{
"name": "CVE-2025-68332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68332"
},
{
"name": "CVE-2020-14356",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14356"
},
{
"name": "CVE-2025-68745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68745"
},
{
"name": "CVE-2023-54263",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54263"
},
{
"name": "CVE-2025-71104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71104"
},
{
"name": "CVE-2026-22978",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22978"
},
{
"name": "CVE-2023-53764",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53764"
},
{
"name": "CVE-2024-53687",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53687"
},
{
"name": "CVE-2025-39901",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39901"
},
{
"name": "CVE-2025-40283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40283"
},
{
"name": "CVE-2025-5918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5918"
},
{
"name": "CVE-2024-38628",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38628"
},
{
"name": "CVE-2025-40324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40324"
},
{
"name": "CVE-2025-38672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38672"
},
{
"name": "CVE-2023-54181",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54181"
},
{
"name": "CVE-2025-0684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0684"
},
{
"name": "CVE-2025-10158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10158"
},
{
"name": "CVE-2025-68378",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68378"
},
{
"name": "CVE-2024-47794",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47794"
},
{
"name": "CVE-2026-23146",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23146"
},
{
"name": "CVE-2025-38272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38272"
},
{
"name": "CVE-2024-10524",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10524"
},
{
"name": "CVE-2025-40146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40146"
},
{
"name": "CVE-2025-38359",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38359"
},
{
"name": "CVE-2019-20794",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20794"
},
{
"name": "CVE-2023-53849",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53849"
},
{
"name": "CVE-2022-4543",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4543"
},
{
"name": "CVE-2025-21899",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21899"
},
{
"name": "CVE-2024-35195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35195"
},
{
"name": "CVE-2025-38129",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38129"
},
{
"name": "CVE-2026-23037",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23037"
},
{
"name": "CVE-2023-53627",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53627"
},
{
"name": "CVE-2025-40250",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40250"
},
{
"name": "CVE-2025-38091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38091"
},
{
"name": "CVE-2023-53510",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53510"
},
{
"name": "CVE-2025-40264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40264"
},
{
"name": "CVE-2025-38334",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38334"
},
{
"name": "CVE-2023-53575",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53575"
},
{
"name": "CVE-2022-49516",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49516"
},
{
"name": "CVE-2025-40778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40778"
},
{
"name": "CVE-2025-38728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38728"
},
{
"name": "CVE-2022-3523",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3523"
},
{
"name": "CVE-2026-26157",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26157"
},
{
"name": "CVE-2026-23001",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23001"
},
{
"name": "CVE-2023-38417",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38417"
},
{
"name": "CVE-2025-68367",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68367"
},
{
"name": "CVE-2025-71224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71224"
},
{
"name": "CVE-2025-22072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22072"
},
{
"name": "CVE-2025-68820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68820"
},
{
"name": "CVE-2021-45261",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45261"
},
{
"name": "CVE-2025-40074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40074"
},
{
"name": "CVE-2026-23193",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23193"
},
{
"name": "CVE-2025-40321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40321"
},
{
"name": "CVE-2024-47736",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47736"
},
{
"name": "CVE-2023-53037",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53037"
},
{
"name": "CVE-2024-46842",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46842"
},
{
"name": "CVE-2025-71237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71237"
},
{
"name": "CVE-2025-13462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13462"
},
{
"name": "CVE-2024-50112",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50112"
},
{
"name": "CVE-2025-69646",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69646"
},
{
"name": "CVE-2023-54207",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54207"
},
{
"name": "CVE-2026-23215",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23215"
},
{
"name": "CVE-2024-28956",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28956"
},
{
"name": "CVE-2025-68740",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68740"
},
{
"name": "CVE-2020-26142",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26142"
},
{
"name": "CVE-2022-49955",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49955"
},
{
"name": "CVE-2023-53628",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53628"
},
{
"name": "CVE-2025-29943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29943"
},
{
"name": "CVE-2025-39978",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39978"
},
{
"name": "CVE-2023-31346",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31346"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2025-40158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40158"
},
{
"name": "CVE-2024-56201",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56201"
},
{
"name": "CVE-2025-38071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38071"
},
{
"name": "CVE-2025-38140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38140"
},
{
"name": "CVE-2022-50002",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50002"
},
{
"name": "CVE-2025-38621",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38621"
},
{
"name": "CVE-2025-68742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68742"
},
{
"name": "CVE-2025-39908",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39908"
},
{
"name": "CVE-2026-24842",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24842"
},
{
"name": "CVE-2024-49920",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49920"
},
{
"name": "CVE-2025-40282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40282"
},
{
"name": "CVE-2026-23118",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23118"
},
{
"name": "CVE-2025-34034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-34034"
},
{
"name": "CVE-2025-37984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37984"
},
{
"name": "CVE-2025-59692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59692"
},
{
"name": "CVE-2022-50116",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50116"
},
{
"name": "CVE-2018-12931",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12931"
},
{
"name": "CVE-2025-40168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40168"
},
{
"name": "CVE-2025-37856",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37856"
},
{
"name": "CVE-2022-50224",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50224"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2020-13791",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13791"
},
{
"name": "CVE-2026-23950",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23950"
},
{
"name": "CVE-2024-49990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49990"
},
{
"name": "CVE-2020-15802",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15802"
},
{
"name": "CVE-2020-24240",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24240"
},
{
"name": "CVE-2024-46718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46718"
},
{
"name": "CVE-2025-68816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68816"
},
{
"name": "CVE-2024-41045",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41045"
},
{
"name": "CVE-2023-53545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53545"
},
{
"name": "CVE-2022-50552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50552"
},
{
"name": "CVE-2021-0066",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0066"
},
{
"name": "CVE-2025-38333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38333"
},
{
"name": "CVE-2023-53376",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53376"
},
{
"name": "CVE-2023-53538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53538"
},
{
"name": "CVE-2025-68192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68192"
},
{
"name": "CVE-2024-5569",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5569"
},
{
"name": "CVE-2025-68379",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68379"
},
{
"name": "CVE-2022-50357",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50357"
},
{
"name": "CVE-2024-57952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57952"
},
{
"name": "CVE-2025-68256",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68256"
},
{
"name": "CVE-2025-68777",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68777"
},
{
"name": "CVE-2023-52671",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52671"
},
{
"name": "CVE-2022-50303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50303"
},
{
"name": "CVE-2024-35870",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35870"
},
{
"name": "CVE-2025-68254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68254"
},
{
"name": "CVE-2026-23221",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23221"
},
{
"name": "CVE-2025-38059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38059"
},
{
"name": "CVE-2024-27014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27014"
},
{
"name": "CVE-2024-36013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36013"
},
{
"name": "CVE-2024-53176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53176"
},
{
"name": "CVE-2025-37956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37956"
},
{
"name": "CVE-2025-40196",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40196"
},
{
"name": "CVE-2024-49880",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49880"
},
{
"name": "CVE-2023-52676",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52676"
},
{
"name": "CVE-2025-38117",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38117"
},
{
"name": "CVE-2017-13165",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13165"
},
{
"name": "CVE-2025-38556",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38556"
},
{
"name": "CVE-2025-68171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68171"
},
{
"name": "CVE-2025-39932",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39932"
},
{
"name": "CVE-2024-47683",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47683"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2024-46811",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46811"
},
{
"name": "CVE-2025-21985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21985"
},
{
"name": "CVE-2025-22109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22109"
},
{
"name": "CVE-2025-38300",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38300"
},
{
"name": "CVE-2025-40040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40040"
},
{
"name": "CVE-2023-53635",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53635"
},
{
"name": "CVE-2025-39810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39810"
},
{
"name": "CVE-2026-22982",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22982"
},
{
"name": "CVE-2025-23132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23132"
},
{
"name": "CVE-2024-47678",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47678"
},
{
"name": "CVE-2022-49531",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49531"
},
{
"name": "CVE-2022-49504",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49504"
},
{
"name": "CVE-2025-1376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1376"
},
{
"name": "CVE-2022-49810",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49810"
},
{
"name": "CVE-2025-47912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47912"
},
{
"name": "CVE-2025-71109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71109"
},
{
"name": "CVE-2023-26586",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26586"
},
{
"name": "CVE-2025-38373",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38373"
},
{
"name": "CVE-2025-66861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66861"
},
{
"name": "CVE-2025-40095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40095"
},
{
"name": "CVE-2025-37957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37957"
},
{
"name": "CVE-2025-38369",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38369"
},
{
"name": "CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"name": "CVE-2024-44950",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44950"
},
{
"name": "CVE-2025-39759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39759"
},
{
"name": "CVE-2022-50332",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50332"
},
{
"name": "CVE-2023-53822",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53822"
},
{
"name": "CVE-2024-27408",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27408"
},
{
"name": "CVE-2025-71222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71222"
},
{
"name": "CVE-2022-50461",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50461"
},
{
"name": "CVE-2025-21801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21801"
},
{
"name": "CVE-2023-26554",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26554"
},
{
"name": "CVE-2025-38486",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38486"
},
{
"name": "CVE-2021-26934",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26934"
},
{
"name": "CVE-2023-53466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53466"
},
{
"name": "CVE-2025-21629",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21629"
},
{
"name": "CVE-2025-71118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71118"
},
{
"name": "CVE-2023-53168",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53168"
},
{
"name": "CVE-2022-49528",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49528"
},
{
"name": "CVE-2025-68160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68160"
},
{
"name": "CVE-2022-45888",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45888"
},
{
"name": "CVE-2022-49218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49218"
},
{
"name": "CVE-2023-52749",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52749"
},
{
"name": "CVE-2025-39754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39754"
},
{
"name": "CVE-2025-40286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40286"
},
{
"name": "CVE-2022-49967",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49967"
},
{
"name": "CVE-2025-68327",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68327"
},
{
"name": "CVE-2024-2236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2236"
},
{
"name": "CVE-2022-49245",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49245"
},
{
"name": "CVE-2025-38098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38098"
},
{
"name": "CVE-2023-52682",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52682"
},
{
"name": "CVE-2022-50871",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50871"
},
{
"name": "CVE-2025-71150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71150"
},
{
"name": "CVE-2025-71229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71229"
},
{
"name": "CVE-2026-23213",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23213"
},
{
"name": "CVE-2025-39958",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39958"
},
{
"name": "CVE-2018-8956",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8956"
},
{
"name": "CVE-2025-40266",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40266"
},
{
"name": "CVE-2026-23091",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23091"
},
{
"name": "CVE-2025-68241",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68241"
},
{
"name": "CVE-2022-49420",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49420"
},
{
"name": "CVE-2022-40964",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40964"
},
{
"name": "CVE-2025-69873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69873"
},
{
"name": "CVE-2026-3441",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3441"
},
{
"name": "CVE-2024-36244",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36244"
},
{
"name": "CVE-2023-53149",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53149"
},
{
"name": "CVE-2026-23237",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23237"
},
{
"name": "CVE-2024-49987",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49987"
},
{
"name": "CVE-2025-60753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-60753"
},
{
"name": "CVE-2022-50746",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50746"
},
{
"name": "CVE-2025-52565",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52565"
},
{
"name": "CVE-2024-50034",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50034"
},
{
"name": "CVE-2025-38259",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38259"
},
{
"name": "CVE-2025-71192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71192"
},
{
"name": "CVE-2023-53596",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53596"
},
{
"name": "CVE-2022-49943",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49943"
},
{
"name": "CVE-2022-50260",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50260"
},
{
"name": "CVE-2025-40135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40135"
},
{
"name": "CVE-2025-67735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-67735"
},
{
"name": "CVE-2026-23121",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23121"
},
{
"name": "CVE-2020-12319",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12319"
},
{
"name": "CVE-2025-37951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37951"
},
{
"name": "CVE-2023-50495",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50495"
},
{
"name": "CVE-2024-49568",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49568"
},
{
"name": "CVE-2025-21750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21750"
},
{
"name": "CVE-2024-36924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36924"
},
{
"name": "CVE-2017-11164",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11164"
},
{
"name": "CVE-2023-3397",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3397"
},
{
"name": "CVE-2025-68734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68734"
},
{
"name": "CVE-2024-26672",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26672"
},
{
"name": "CVE-2024-57924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57924"
},
{
"name": "CVE-2025-37947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37947"
},
{
"name": "CVE-2025-68776",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68776"
},
{
"name": "CVE-2025-61728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61728"
},
{
"name": "CVE-2025-71066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71066"
},
{
"name": "CVE-2026-0965",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0965"
},
{
"name": "CVE-2023-53806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53806"
},
{
"name": "CVE-2025-21817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21817"
},
{
"name": "CVE-2025-68972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68972"
},
{
"name": "CVE-2025-68799",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68799"
},
{
"name": "CVE-2021-33139",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33139"
},
{
"name": "CVE-2025-58186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58186"
},
{
"name": "CVE-2025-21825",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21825"
},
{
"name": "CVE-2025-38192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38192"
},
{
"name": "CVE-2025-71236",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71236"
},
{
"name": "CVE-2025-68345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68345"
},
{
"name": "CVE-2025-39800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39800"
},
{
"name": "CVE-2024-50057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50057"
},
{
"name": "CVE-2025-38343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38343"
},
{
"name": "CVE-2025-71097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71097"
},
{
"name": "CVE-2024-46808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46808"
},
{
"name": "CVE-2026-26158",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26158"
},
{
"name": "CVE-2025-38202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38202"
},
{
"name": "CVE-2025-68288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68288"
},
{
"name": "CVE-2025-38168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38168"
},
{
"name": "CVE-2023-53547",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53547"
},
{
"name": "CVE-2019-20426",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20426"
},
{
"name": "CVE-2025-71107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71107"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2025-40310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40310"
},
{
"name": "CVE-2026-29786",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-29786"
},
{
"name": "CVE-2025-58187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58187"
},
{
"name": "CVE-2025-40083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40083"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2024-56584",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56584"
},
{
"name": "CVE-2026-23235",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23235"
},
{
"name": "CVE-2025-71111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71111"
},
{
"name": "CVE-2022-4899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4899"
},
{
"name": "CVE-2025-71152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71152"
},
{
"name": "CVE-2024-42139",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42139"
},
{
"name": "CVE-2024-56692",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56692"
},
{
"name": "CVE-2024-53196",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53196"
},
{
"name": "CVE-2025-38665",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38665"
},
{
"name": "CVE-2022-50212",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50212"
},
{
"name": "CVE-2026-23087",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23087"
},
{
"name": "CVE-2023-54259",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54259"
},
{
"name": "CVE-2025-68802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68802"
},
{
"name": "CVE-2023-54067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54067"
},
{
"name": "CVE-2025-1369",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1369"
},
{
"name": "CVE-2022-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3219"
},
{
"name": "CVE-2025-68317",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68317"
},
{
"name": "CVE-2023-53231",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53231"
},
{
"name": "CVE-2025-71185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71185"
},
{
"name": "CVE-2022-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2961"
},
{
"name": "CVE-2025-40331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40331"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2022-49635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49635"
},
{
"name": "CVE-2024-50017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50017"
},
{
"name": "CVE-2026-23096",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23096"
},
{
"name": "CVE-2024-53241",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53241"
},
{
"name": "CVE-2025-14180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14180"
},
{
"name": "CVE-2026-23949",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23949"
},
{
"name": "CVE-2025-38704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38704"
},
{
"name": "CVE-2023-34969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34969"
},
{
"name": "CVE-2021-33155",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33155"
},
{
"name": "CVE-2025-68337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68337"
},
{
"name": "CVE-2024-57899",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57899"
},
{
"name": "CVE-2024-49928",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49928"
},
{
"name": "CVE-2025-21885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21885"
},
{
"name": "CVE-2024-50187",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50187"
},
{
"name": "CVE-2022-50851",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50851"
},
{
"name": "CVE-2025-36001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36001"
},
{
"name": "CVE-2022-50464",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50464"
},
{
"name": "CVE-2025-38674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38674"
},
{
"name": "CVE-2025-40093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40093"
},
{
"name": "CVE-2020-26560",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26560"
},
{
"name": "CVE-2024-26714",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26714"
},
{
"name": "CVE-2024-45777",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45777"
},
{
"name": "CVE-2025-38040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38040"
},
{
"name": "CVE-2024-40954",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40954"
},
{
"name": "CVE-2022-49965",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49965"
},
{
"name": "CVE-2025-54771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54771"
},
{
"name": "CVE-2024-0564",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0564"
},
{
"name": "CVE-2025-39825",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39825"
},
{
"name": "CVE-2025-71131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71131"
},
{
"name": "CVE-2022-49961",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49961"
},
{
"name": "CVE-2025-69651",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69651"
},
{
"name": "CVE-2025-38552",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38552"
},
{
"name": "CVE-2025-40335",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40335"
},
{
"name": "CVE-2025-40149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40149"
},
{
"name": "CVE-2024-58098",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58098"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2022-28667",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28667"
},
{
"name": "CVE-2023-53383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53383"
},
{
"name": "CVE-2024-46717",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46717"
},
{
"name": "CVE-2024-25743",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25743"
},
{
"name": "CVE-2022-50704",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50704"
},
{
"name": "CVE-2025-40164",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40164"
},
{
"name": "CVE-2023-54125",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54125"
},
{
"name": "CVE-2025-10911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10911"
},
{
"name": "CVE-2026-23164",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23164"
},
{
"name": "CVE-2024-41036",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41036"
},
{
"name": "CVE-2023-53751",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53751"
},
{
"name": "CVE-2025-0033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0033"
},
{
"name": "CVE-2023-53743",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53743"
},
{
"name": "CVE-2024-42319",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42319"
},
{
"name": "CVE-2025-37928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37928"
},
{
"name": "CVE-2017-13716",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13716"
},
{
"name": "CVE-2024-22018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22018"
},
{
"name": "CVE-2025-71116",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71116"
},
{
"name": "CVE-2022-40735",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40735"
},
{
"name": "CVE-2024-36024",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36024"
},
{
"name": "CVE-2025-21723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21723"
},
{
"name": "CVE-2023-54190",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54190"
},
{
"name": "CVE-2023-52879",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52879"
},
{
"name": "CVE-2025-68281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68281"
},
{
"name": "CVE-2023-52837",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52837"
},
{
"name": "CVE-2025-38440",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38440"
},
{
"name": "CVE-2026-23124",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23124"
},
{
"name": "CVE-2023-52981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52981"
},
{
"name": "CVE-2024-53224",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53224"
},
{
"name": "CVE-2024-49910",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49910"
},
{
"name": "CVE-2025-68362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68362"
},
{
"name": "CVE-2023-53105",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53105"
},
{
"name": "CVE-2025-68236",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68236"
},
{
"name": "CVE-2024-39286",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39286"
},
{
"name": "CVE-2025-25184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25184"
},
{
"name": "CVE-2025-14524",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14524"
},
{
"name": "CVE-2024-49855",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49855"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2025-68333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68333"
},
{
"name": "CVE-2024-47689",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47689"
},
{
"name": "CVE-2025-71160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71160"
},
{
"name": "CVE-2025-71232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71232"
},
{
"name": "CVE-2023-52625",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52625"
},
{
"name": "CVE-2023-53353",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53353"
},
{
"name": "CVE-2024-58096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58096"
},
{
"name": "CVE-2025-38225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38225"
},
{
"name": "CVE-2023-53401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53401"
},
{
"name": "CVE-2025-22037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22037"
},
{
"name": "CVE-2023-53702",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53702"
},
{
"name": "CVE-2025-68290",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68290"
},
{
"name": "CVE-2025-40280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40280"
},
{
"name": "CVE-2024-26842",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26842"
},
{
"name": "CVE-2025-40099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40099"
},
{
"name": "CVE-2023-54059",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54059"
},
{
"name": "CVE-2025-71162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71162"
},
{
"name": "CVE-2021-0170",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0170"
},
{
"name": "CVE-2019-10782",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10782"
},
{
"name": "CVE-2024-40966",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40966"
},
{
"name": "CVE-2024-53133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53133"
},
{
"name": "CVE-2026-23075",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23075"
},
{
"name": "CVE-2022-50571",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50571"
},
{
"name": "CVE-2021-31879",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31879"
},
{
"name": "CVE-2026-23120",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23120"
},
{
"name": "CVE-2025-40180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40180"
},
{
"name": "CVE-2022-49393",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49393"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2025-68803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68803"
},
{
"name": "CVE-2026-22996",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22996"
},
{
"name": "CVE-2024-53091",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53091"
},
{
"name": "CVE-2025-39851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39851"
},
{
"name": "CVE-2025-71204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71204"
},
{
"name": "CVE-2025-68331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68331"
},
{
"name": "CVE-2025-38244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38244"
},
{
"name": "CVE-2022-29217",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29217"
},
{
"name": "CVE-2024-26758",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26758"
},
{
"name": "CVE-2025-38080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38080"
},
{
"name": "CVE-2023-32651",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32651"
},
{
"name": "CVE-2025-37747",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37747"
},
{
"name": "CVE-2026-2297",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2297"
},
{
"name": "CVE-2026-23105",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23105"
},
{
"name": "CVE-2023-53036",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53036"
},
{
"name": "CVE-2025-38615",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38615"
},
{
"name": "CVE-2025-58181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58181"
},
{
"name": "CVE-2025-71115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71115"
},
{
"name": "CVE-2026-22976",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22976"
},
{
"name": "CVE-2022-50862",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50862"
},
{
"name": "CVE-2025-1118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1118"
},
{
"name": "CVE-2024-50166",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50166"
},
{
"name": "CVE-2024-35862",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35862"
},
{
"name": "CVE-2023-53355",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53355"
},
{
"name": "CVE-2022-25265",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25265"
},
{
"name": "CVE-2026-0967",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0967"
},
{
"name": "CVE-2026-23181",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23181"
},
{
"name": "CVE-2025-37944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37944"
},
{
"name": "CVE-2023-53558",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53558"
},
{
"name": "CVE-2025-47914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47914"
},
{
"name": "CVE-2025-68214",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68214"
},
{
"name": "CVE-2025-38703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38703"
},
{
"name": "CVE-2026-23141",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23141"
},
{
"name": "CVE-2026-22860",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22860"
},
{
"name": "CVE-2025-36365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36365"
},
{
"name": "CVE-2025-9403",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9403"
},
{
"name": "CVE-2025-40247",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40247"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2024-56641",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56641"
},
{
"name": "CVE-2024-43842",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43842"
},
{
"name": "CVE-2025-0686",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0686"
},
{
"name": "CVE-2025-21739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21739"
},
{
"name": "CVE-2024-49992",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49992"
},
{
"name": "CVE-2025-68781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68781"
},
{
"name": "CVE-2025-39753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39753"
},
{
"name": "CVE-2025-69418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69418"
},
{
"name": "CVE-2026-23182",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23182"
},
{
"name": "CVE-2021-0173",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0173"
},
{
"name": "CVE-2025-71112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71112"
},
{
"name": "CVE-2023-54285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54285"
},
{
"name": "CVE-2024-45778",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45778"
},
{
"name": "CVE-2026-23086",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23086"
},
{
"name": "CVE-2024-47661",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47661"
},
{
"name": "CVE-2026-28418",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28418"
},
{
"name": "CVE-2023-54151",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54151"
},
{
"name": "CVE-2025-22022",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22022"
},
{
"name": "CVE-2025-66864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66864"
},
{
"name": "CVE-2024-46803",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46803"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2025-59466",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59466"
},
{
"name": "CVE-2025-40192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40192"
},
{
"name": "CVE-2025-38544",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38544"
},
{
"name": "CVE-2025-39797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39797"
},
{
"name": "CVE-2025-68818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68818"
},
{
"name": "CVE-2022-36351",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36351"
},
{
"name": "CVE-2023-52921",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52921"
},
{
"name": "CVE-2025-15468",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15468"
},
{
"name": "CVE-2024-36478",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36478"
},
{
"name": "CVE-2024-43832",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43832"
},
{
"name": "CVE-2026-25639",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25639"
},
{
"name": "CVE-2026-1299",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1299"
},
{
"name": "CVE-2024-54683",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54683"
},
{
"name": "CVE-2025-1150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1150"
},
{
"name": "CVE-2024-46720",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46720"
},
{
"name": "CVE-2024-26658",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26658"
},
{
"name": "CVE-2026-2243",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2243"
},
{
"name": "CVE-2025-38198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38198"
},
{
"name": "CVE-2025-58189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58189"
},
{
"name": "CVE-2022-36087",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36087"
},
{
"name": "CVE-2024-38564",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38564"
},
{
"name": "CVE-2021-0174",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0174"
},
{
"name": "CVE-2025-8746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8746"
},
{
"name": "CVE-2025-36442",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36442"
},
{
"name": "CVE-2025-38006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38006"
},
{
"name": "CVE-2025-40102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40102"
},
{
"name": "CVE-2026-0968",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0968"
},
{
"name": "CVE-2025-40170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40170"
},
{
"name": "CVE-2025-38437",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38437"
},
{
"name": "CVE-2025-40160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40160"
},
{
"name": "CVE-2023-7008",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7008"
},
{
"name": "CVE-2024-45779",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45779"
},
{
"name": "CVE-2025-40284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40284"
},
{
"name": "CVE-2025-38125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38125"
},
{
"name": "CVE-2025-40077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40077"
},
{
"name": "CVE-2024-57857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57857"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2022-50213",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50213"
},
{
"name": "CVE-2024-46823",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46823"
},
{
"name": "CVE-2023-32642",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32642"
},
{
"name": "CVE-2025-71227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71227"
},
{
"name": "CVE-2025-61772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61772"
},
{
"name": "CVE-2024-46733",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46733"
},
{
"name": "CVE-2024-41014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41014"
},
{
"name": "CVE-2022-50015",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50015"
},
{
"name": "CVE-2025-40071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40071"
},
{
"name": "CVE-2024-7883",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7883"
},
{
"name": "CVE-2024-50271",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50271"
},
{
"name": "CVE-2022-50772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50772"
},
{
"name": "CVE-2024-56717",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56717"
},
{
"name": "CVE-2025-68366",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68366"
},
{
"name": "CVE-2024-56707",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56707"
},
{
"name": "CVE-2023-54234",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54234"
},
{
"name": "CVE-2022-45885",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45885"
},
{
"name": "CVE-2022-49783",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49783"
},
{
"name": "CVE-2025-40305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40305"
},
{
"name": "CVE-2016-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2781"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2025-47153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47153"
},
{
"name": "CVE-2025-40080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40080"
},
{
"name": "CVE-2024-53216",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53216"
},
{
"name": "CVE-2022-49539",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49539"
},
{
"name": "CVE-2024-36347",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36347"
},
{
"name": "CVE-2024-26869",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26869"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2025-68815",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68815"
},
{
"name": "CVE-2021-20255",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20255"
},
{
"name": "CVE-2022-48979",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48979"
},
{
"name": "CVE-2025-40307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40307"
},
{
"name": "CVE-2025-71193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71193"
},
{
"name": "CVE-2023-54180",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54180"
},
{
"name": "CVE-2026-23095",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23095"
},
{
"name": "CVE-2024-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46848"
},
{
"name": "CVE-2025-68346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68346"
},
{
"name": "CVE-2025-38081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38081"
},
{
"name": "CVE-2024-36009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36009"
},
{
"name": "CVE-2025-71163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71163"
},
{
"name": "CVE-2024-36350",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36350"
},
{
"name": "CVE-2023-25951",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25951"
},
{
"name": "CVE-2025-40211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40211"
},
{
"name": "CVE-2023-53152",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53152"
},
{
"name": "CVE-2021-0308",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0308"
},
{
"name": "CVE-2025-68315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68315"
},
{
"name": "CVE-2024-50009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50009"
},
{
"name": "CVE-2025-39850",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39850"
},
{
"name": "CVE-2022-1205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1205"
},
{
"name": "CVE-2023-45927",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45927"
},
{
"name": "CVE-2020-25742",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25742"
},
{
"name": "CVE-2022-0987",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0987"
},
{
"name": "CVE-2025-71096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71096"
},
{
"name": "CVE-2025-71095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71095"
},
{
"name": "CVE-2025-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40217"
},
{
"name": "CVE-2025-38199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38199"
},
{
"name": "CVE-2025-39905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39905"
},
{
"name": "CVE-2025-21944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21944"
},
{
"name": "CVE-2022-50720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50720"
},
{
"name": "CVE-2025-71105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71105"
},
{
"name": "CVE-2023-50387",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50387"
},
{
"name": "CVE-2022-49529",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49529"
},
{
"name": "CVE-2025-68266",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68266"
},
{
"name": "CVE-2024-27057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27057"
},
{
"name": "CVE-2025-68771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68771"
},
{
"name": "CVE-2025-39961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39961"
},
{
"name": "CVE-2025-68363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68363"
},
{
"name": "CVE-2024-54456",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54456"
},
{
"name": "CVE-2024-26876",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26876"
},
{
"name": "CVE-2025-40248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40248"
},
{
"name": "CVE-2023-52657",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52657"
},
{
"name": "CVE-2025-37876",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37876"
},
{
"name": "CVE-2024-58089",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58089"
},
{
"name": "CVE-2024-36331",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36331"
},
{
"name": "CVE-2026-27571",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27571"
},
{
"name": "CVE-2025-39748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39748"
},
{
"name": "CVE-2026-22984",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22984"
},
{
"name": "CVE-2026-27139",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27139"
},
{
"name": "CVE-2022-49127",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49127"
},
{
"name": "CVE-2026-24733",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24733"
},
{
"name": "CVE-2020-25741",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25741"
},
{
"name": "CVE-2022-50748",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50748"
},
{
"name": "CVE-2023-53767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53767"
},
{
"name": "CVE-2025-21667",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21667"
},
{
"name": "CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"name": "CVE-2023-49083",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49083"
},
{
"name": "CVE-2025-21696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21696"
},
{
"name": "CVE-2025-68303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68303"
},
{
"name": "CVE-2025-21955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21955"
},
{
"name": "CVE-2025-39863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39863"
},
{
"name": "CVE-2025-40259",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40259"
},
{
"name": "CVE-2023-53180",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53180"
},
{
"name": "CVE-2026-28419",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28419"
},
{
"name": "CVE-2025-8677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8677"
},
{
"name": "CVE-2025-38560",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38560"
},
{
"name": "CVE-2023-53385",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53385"
},
{
"name": "CVE-2026-23206",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23206"
},
{
"name": "CVE-2025-68757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68757"
},
{
"name": "CVE-2024-46678",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46678"
},
{
"name": "CVE-2024-58097",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58097"
},
{
"name": "CVE-2023-53620",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53620"
},
{
"name": "CVE-2022-50539",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50539"
},
{
"name": "CVE-2025-71068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71068"
},
{
"name": "CVE-2025-23130",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23130"
},
{
"name": "CVE-2022-49496",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49496"
},
{
"name": "CVE-2025-38349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38349"
},
{
"name": "CVE-2024-56782",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56782"
},
{
"name": "CVE-2025-39957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39957"
},
{
"name": "CVE-2025-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1352"
},
{
"name": "CVE-2023-53540",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53540"
},
{
"name": "CVE-2022-49552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49552"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2023-53261",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53261"
},
{
"name": "CVE-2026-24049",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24049"
},
{
"name": "CVE-2026-23033",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23033"
},
{
"name": "CVE-2025-39726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39726"
},
{
"name": "CVE-2024-26759",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26759"
},
{
"name": "CVE-2025-48924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
},
{
"name": "CVE-2025-39931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39931"
},
{
"name": "CVE-2023-54187",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54187"
},
{
"name": "CVE-2026-22977",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22977"
},
{
"name": "CVE-2026-23145",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23145"
},
{
"name": "CVE-2022-44032",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44032"
},
{
"name": "CVE-2024-57895",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57895"
},
{
"name": "CVE-2023-53240",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53240"
},
{
"name": "CVE-2025-13735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13735"
},
{
"name": "CVE-2023-53694",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53694"
},
{
"name": "CVE-2024-53195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53195"
},
{
"name": "CVE-2024-35794",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35794"
},
{
"name": "CVE-2023-52829",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52829"
},
{
"name": "CVE-2026-23003",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23003"
},
{
"name": "CVE-2025-21891",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21891"
},
{
"name": "CVE-2025-38716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38716"
},
{
"name": "CVE-2025-11187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11187"
},
{
"name": "CVE-2024-56660",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56660"
},
{
"name": "CVE-2026-23076",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23076"
},
{
"name": "CVE-2023-54145",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54145"
},
{
"name": "CVE-2025-38033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38033"
},
{
"name": "CVE-2024-41023",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41023"
},
{
"name": "CVE-2024-47704",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47704"
},
{
"name": "CVE-2025-21672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21672"
},
{
"name": "CVE-2024-35801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35801"
},
{
"name": "CVE-2024-49978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49978"
},
{
"name": "CVE-2024-36910",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36910"
},
{
"name": "CVE-2025-15079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15079"
},
{
"name": "CVE-2024-49870",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49870"
},
{
"name": "CVE-2025-36366",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36366"
},
{
"name": "CVE-2024-42125",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42125"
},
{
"name": "CVE-2025-36123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36123"
},
{
"name": "CVE-2024-56737",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56737"
},
{
"name": "CVE-2025-68168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68168"
},
{
"name": "CVE-2025-21821",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21821"
},
{
"name": "CVE-2025-68206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68206"
},
{
"name": "CVE-2020-11935",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11935"
},
{
"name": "CVE-2023-54247",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54247"
},
{
"name": "CVE-2025-68309",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68309"
},
{
"name": "CVE-2023-52905",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52905"
},
{
"name": "CVE-2024-57852",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57852"
},
{
"name": "CVE-2025-40003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40003"
},
{
"name": "CVE-2025-22042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22042"
},
{
"name": "CVE-2025-71158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71158"
},
{
"name": "CVE-2022-49803",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49803"
},
{
"name": "CVE-2024-57898",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57898"
},
{
"name": "CVE-2020-35503",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35503"
},
{
"name": "CVE-2024-49923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49923"
},
{
"name": "CVE-2024-56639",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56639"
},
{
"name": "CVE-2025-68372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68372"
},
{
"name": "CVE-2026-23171",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23171"
},
{
"name": "CVE-2024-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
},
{
"name": "CVE-2023-53002",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53002"
},
{
"name": "CVE-2021-0183",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0183"
},
{
"name": "CVE-2025-39884",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39884"
},
{
"name": "CVE-2025-39747",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39747"
},
{
"name": "CVE-2024-36914",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36914"
},
{
"name": "CVE-2026-26996",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26996"
},
{
"name": "CVE-2024-35826",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35826"
},
{
"name": "CVE-2026-23112",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23112"
},
{
"name": "CVE-2022-49764",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49764"
},
{
"name": "CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"name": "CVE-2025-21651",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21651"
},
{
"name": "CVE-2025-38092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38092"
},
{
"name": "CVE-2025-22124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22124"
},
{
"name": "CVE-2025-68313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68313"
},
{
"name": "CVE-2024-58053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58053"
},
{
"name": "CVE-2023-26553",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26553"
},
{
"name": "CVE-2025-60876",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-60876"
},
{
"name": "CVE-2025-37776",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37776"
},
{
"name": "CVE-2021-23840",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23840"
},
{
"name": "CVE-2024-58077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58077"
},
{
"name": "CVE-2024-6519",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6519"
},
{
"name": "CVE-2024-46729",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46729"
},
{
"name": "CVE-2023-53850",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53850"
},
{
"name": "CVE-2023-2975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
},
{
"name": "CVE-2022-50266",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50266"
},
{
"name": "CVE-2024-53178",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53178"
},
{
"name": "CVE-2025-71137",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71137"
},
{
"name": "CVE-2026-23084",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23084"
},
{
"name": "CVE-2023-53093",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53093"
},
{
"name": "CVE-2025-11065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11065"
},
{
"name": "CVE-2026-23190",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23190"
},
{
"name": "CVE-2025-40123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40123"
},
{
"name": "CVE-2026-22979",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22979"
},
{
"name": "CVE-2025-68301",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68301"
},
{
"name": "CVE-2024-49991",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49991"
},
{
"name": "CVE-2022-50009",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50009"
},
{
"name": "CVE-2022-26047",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26047"
},
{
"name": "CVE-2024-53240",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53240"
},
{
"name": "CVE-2026-23011",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23011"
},
{
"name": "CVE-2024-36949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36949"
},
{
"name": "CVE-2023-53816",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53816"
},
{
"name": "CVE-2025-37877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37877"
},
{
"name": "CVE-2024-2193",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2193"
},
{
"name": "CVE-2025-4382",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4382"
},
{
"name": "CVE-2022-28693",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28693"
},
{
"name": "CVE-2025-71161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71161"
},
{
"name": "CVE-2025-39706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39706"
},
{
"name": "CVE-2025-22038",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22038"
},
{
"name": "CVE-2025-68217",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68217"
},
{
"name": "CVE-2023-54242",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54242"
},
{
"name": "CVE-2025-68289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68289"
},
{
"name": "CVE-2025-40363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40363"
},
{
"name": "CVE-2024-41062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41062"
},
{
"name": "CVE-2025-40253",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40253"
},
{
"name": "CVE-2022-48816",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48816"
},
{
"name": "CVE-2026-27141",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27141"
},
{
"name": "CVE-2025-37800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37800"
},
{
"name": "CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"name": "CVE-2022-50518",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50518"
},
{
"name": "CVE-2022-49829",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49829"
},
{
"name": "CVE-2025-64756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64756"
},
{
"name": "CVE-2025-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21967"
},
{
"name": "CVE-2016-2568",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2568"
},
{
"name": "CVE-2020-13817",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13817"
},
{
"name": "CVE-2025-68245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68245"
},
{
"name": "CVE-2025-41254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41254"
},
{
"name": "CVE-2018-12929",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12929"
},
{
"name": "CVE-2024-26853",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26853"
},
{
"name": "CVE-2024-53147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53147"
},
{
"name": "CVE-2025-39952",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39952"
},
{
"name": "CVE-2025-40317",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40317"
},
{
"name": "CVE-2024-45783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45783"
},
{
"name": "CVE-2026-23110",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23110"
},
{
"name": "CVE-2023-53410",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53410"
},
{
"name": "CVE-2023-53254",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53254"
},
{
"name": "CVE-2024-34064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34064"
},
{
"name": "CVE-2023-47210",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47210"
},
{
"name": "CVE-2025-68809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68809"
},
{
"name": "CVE-2025-53864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53864"
},
{
"name": "CVE-2024-36920",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36920"
},
{
"name": "CVE-2021-0165",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0165"
},
{
"name": "CVE-2025-0624",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0624"
},
{
"name": "CVE-2022-49177",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49177"
},
{
"name": "CVE-2025-38205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38205"
},
{
"name": "CVE-2026-23100",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23100"
},
{
"name": "CVE-2025-59464",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59464"
},
{
"name": "CVE-2024-58241",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58241"
},
{
"name": "CVE-2025-21863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21863"
},
{
"name": "CVE-2025-71120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71120"
},
{
"name": "CVE-2025-38166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38166"
},
{
"name": "CVE-2022-49833",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49833"
},
{
"name": "CVE-2026-23060",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23060"
},
{
"name": "CVE-2025-38321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38321"
},
{
"name": "CVE-2025-68282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68282"
},
{
"name": "CVE-2025-39705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39705"
},
{
"name": "CVE-2025-68817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68817"
},
{
"name": "CVE-2024-36021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36021"
},
{
"name": "CVE-2025-38045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38045"
},
{
"name": "CVE-2024-46726",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46726"
},
{
"name": "CVE-2025-40025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40025"
},
{
"name": "CVE-2024-53079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53079"
},
{
"name": "CVE-2025-68787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68787"
},
{
"name": "CVE-2025-1125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1125"
},
{
"name": "CVE-2023-53647",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53647"
},
{
"name": "CVE-2025-37954",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37954"
},
{
"name": "CVE-2025-23133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23133"
},
{
"name": "CVE-2025-0012",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0012"
},
{
"name": "CVE-2020-12313",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12313"
},
{
"name": "CVE-2025-71233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71233"
},
{
"name": "CVE-2025-68782",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68782"
},
{
"name": "CVE-2021-0166",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0166"
},
{
"name": "CVE-2025-21945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21945"
},
{
"name": "CVE-2022-3872",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3872"
},
{
"name": "CVE-2025-39744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39744"
},
{
"name": "CVE-2025-71197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71197"
},
{
"name": "CVE-2025-68177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68177"
},
{
"name": "CVE-2025-68758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68758"
},
{
"name": "CVE-2024-49931",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49931"
},
{
"name": "CVE-2024-43866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43866"
},
{
"name": "CVE-2024-37021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37021"
},
{
"name": "CVE-2024-47728",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47728"
},
{
"name": "CVE-2025-27610",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27610"
},
{
"name": "CVE-2025-68191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68191"
},
{
"name": "CVE-2026-23031",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23031"
},
{
"name": "CVE-2024-46730",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46730"
},
{
"name": "CVE-2025-71113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71113"
},
{
"name": "CVE-2025-71127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71127"
},
{
"name": "CVE-2025-37786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37786"
},
{
"name": "CVE-2024-46728",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46728"
},
{
"name": "CVE-2023-53561",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53561"
},
{
"name": "CVE-2026-22998",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22998"
},
{
"name": "CVE-2023-54172",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54172"
},
{
"name": "CVE-2026-23050",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23050"
},
{
"name": "CVE-2024-58100",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58100"
},
{
"name": "CVE-2020-0256",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0256"
},
{
"name": "CVE-2025-21673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21673"
},
{
"name": "CVE-2024-26954",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26954"
},
{
"name": "CVE-2025-21634",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21634"
},
{
"name": "CVE-2024-57999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57999"
},
{
"name": "CVE-2025-38047",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38047"
},
{
"name": "CVE-2024-47738",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47738"
},
{
"name": "CVE-2025-68340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68340"
},
{
"name": "CVE-2024-41013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41013"
},
{
"name": "CVE-2023-54320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54320"
},
{
"name": "CVE-2024-43911",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43911"
},
{
"name": "CVE-2025-30204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30204"
},
{
"name": "CVE-2025-37959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37959"
},
{
"name": "CVE-2017-0537",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0537"
},
{
"name": "CVE-2025-38191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38191"
},
{
"name": "CVE-2023-32681",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32681"
},
{
"name": "CVE-2025-68219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68219"
},
{
"name": "CVE-2022-50232",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50232"
},
{
"name": "CVE-2025-38062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38062"
},
{
"name": "CVE-2025-38531",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38531"
},
{
"name": "CVE-2023-26112",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26112"
},
{
"name": "CVE-2018-6952",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-6952"
},
{
"name": "CVE-2020-14304",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14304"
},
{
"name": "CVE-2024-46834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46834"
},
{
"name": "CVE-2025-40288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40288"
},
{
"name": "CVE-2025-68239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68239"
},
{
"name": "CVE-2025-40258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40258"
},
{
"name": "CVE-2025-21894",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21894"
},
{
"name": "CVE-2025-40281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40281"
},
{
"name": "CVE-2025-68185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68185"
},
{
"name": "CVE-2025-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40304"
},
{
"name": "CVE-2025-38503",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38503"
},
{
"name": "CVE-2025-40110",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40110"
},
{
"name": "CVE-2026-24001",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24001"
},
{
"name": "CVE-2025-37807",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37807"
},
{
"name": "CVE-2025-38131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38131"
},
{
"name": "CVE-2022-50016",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50016"
},
{
"name": "CVE-2025-29481",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29481"
},
{
"name": "CVE-2024-53219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53219"
},
{
"name": "CVE-2023-53009",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53009"
},
{
"name": "CVE-2025-40268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40268"
},
{
"name": "CVE-2025-61661",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61661"
},
{
"name": "CVE-2026-23111",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23111"
},
{
"name": "CVE-2024-25740",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25740"
},
{
"name": "CVE-2024-50246",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50246"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2025-14178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14178"
},
{
"name": "CVE-2024-57950",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57950"
},
{
"name": "CVE-2025-21759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21759"
},
{
"name": "CVE-2025-40325",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40325"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2024-42321",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42321"
},
{
"name": "CVE-2026-23113",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23113"
},
{
"name": "CVE-2021-0176",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0176"
},
{
"name": "CVE-2025-1151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1151"
},
{
"name": "CVE-2022-48998",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48998"
},
{
"name": "CVE-2025-68798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68798"
},
{
"name": "CVE-2024-42273",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42273"
},
{
"name": "CVE-2025-68336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68336"
},
{
"name": "CVE-2023-53794",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53794"
},
{
"name": "CVE-2026-23157",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23157"
},
{
"name": "CVE-2025-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40303"
},
{
"name": "CVE-2025-68178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68178"
},
{
"name": "CVE-2022-49974",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49974"
},
{
"name": "CVE-2025-40337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40337"
},
{
"name": "CVE-2019-20633",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20633"
},
{
"name": "CVE-2025-38264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38264"
},
{
"name": "CVE-2021-3714",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3714"
},
{
"name": "CVE-2023-54071",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54071"
},
{
"name": "CVE-2024-56566",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56566"
},
{
"name": "CVE-2025-46392",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46392"
},
{
"name": "CVE-2025-40036",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40036"
},
{
"name": "CVE-2024-57993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57993"
},
{
"name": "CVE-2024-47745",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47745"
},
{
"name": "CVE-2025-39833",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39833"
},
{
"name": "CVE-2026-23097",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23097"
},
{
"name": "CVE-2025-37980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37980"
},
{
"name": "CVE-2024-53190",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53190"
},
{
"name": "CVE-2025-40262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40262"
},
{
"name": "CVE-2024-35784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35784"
},
{
"name": "CVE-2024-56591",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56591"
},
{
"name": "CVE-2024-56544",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56544"
},
{
"name": "CVE-2024-56647",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56647"
},
{
"name": "CVE-2025-71198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71198"
},
{
"name": "CVE-2025-21649",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21649"
},
{
"name": "CVE-2024-57976",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57976"
},
{
"name": "CVE-2025-68819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68819"
},
{
"name": "CVE-2025-0685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0685"
},
{
"name": "CVE-2024-57893",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57893"
},
{
"name": "CVE-2026-23231",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23231"
},
{
"name": "CVE-2025-37879",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37879"
},
{
"name": "CVE-2022-50071",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50071"
},
{
"name": "CVE-2025-40261",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40261"
},
{
"name": "CVE-2024-56180",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56180"
},
{
"name": "CVE-2023-39333",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39333"
},
{
"name": "CVE-2025-38643",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38643"
},
{
"name": "CVE-2021-3864",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3864"
},
{
"name": "CVE-2025-39771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39771"
},
{
"name": "CVE-2023-52591",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52591"
},
{
"name": "CVE-2024-26648",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26648"
},
{
"name": "CVE-2025-66862",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66862"
},
{
"name": "CVE-2020-11868",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11868"
},
{
"name": "CVE-2020-24352",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24352"
},
{
"name": "CVE-2024-36000",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36000"
},
{
"name": "CVE-2026-23021",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23021"
},
{
"name": "CVE-2025-39819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39819"
},
{
"name": "CVE-2022-49296",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49296"
},
{
"name": "CVE-2025-61780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61780"
},
{
"name": "CVE-2024-49914",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49914"
},
{
"name": "CVE-2025-38360",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38360"
},
{
"name": "CVE-2025-68732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68732"
},
{
"name": "CVE-2025-39715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39715"
},
{
"name": "CVE-2025-36407",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36407"
},
{
"name": "CVE-2024-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0217"
},
{
"name": "CVE-2025-40323",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40323"
},
{
"name": "CVE-2025-21732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21732"
},
{
"name": "CVE-2021-47658",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47658"
},
{
"name": "CVE-2025-68285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68285"
},
{
"name": "CVE-2025-4575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4575"
},
{
"name": "CVE-2019-12067",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12067"
},
{
"name": "CVE-2024-57843",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57843"
},
{
"name": "CVE-2025-38512",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38512"
},
{
"name": "CVE-2024-50135",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50135"
},
{
"name": "CVE-2024-49916",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49916"
},
{
"name": "CVE-2025-68119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68119"
},
{
"name": "CVE-2024-49988",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49988"
},
{
"name": "CVE-2023-52648",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52648"
},
{
"name": "CVE-2024-49861",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49861"
},
{
"name": "CVE-2026-23093",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23093"
},
{
"name": "CVE-2024-49893",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49893"
},
{
"name": "CVE-2024-44963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44963"
},
{
"name": "CVE-2023-53348",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53348"
},
{
"name": "CVE-2022-48766",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48766"
},
{
"name": "CVE-2019-15794",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15794"
},
{
"name": "CVE-2024-49917",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49917"
},
{
"name": "CVE-2022-50467",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50467"
},
{
"name": "CVE-2025-37849",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37849"
},
{
"name": "CVE-2025-32441",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32441"
},
{
"name": "CVE-2024-48875",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-48875"
},
{
"name": "CVE-2024-41935",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41935"
},
{
"name": "CVE-2025-38162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38162"
},
{
"name": "CVE-2022-23491",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23491"
},
{
"name": "CVE-2025-22873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22873"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2025-71183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71183"
},
{
"name": "CVE-2023-54047",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54047"
},
{
"name": "CVE-2023-53382",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53382"
},
{
"name": "CVE-2024-50060",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50060"
},
{
"name": "CVE-2025-39677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39677"
},
{
"name": "CVE-2023-53651",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53651"
},
{
"name": "CVE-2025-21832",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21832"
},
{
"name": "CVE-2025-68371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68371"
},
{
"name": "CVE-2022-50383",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50383"
},
{
"name": "CVE-2025-39707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39707"
},
{
"name": "CVE-2025-40275",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40275"
},
{
"name": "CVE-2023-53387",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53387"
},
{
"name": "CVE-2026-31802",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31802"
},
{
"name": "CVE-2024-45774",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45774"
},
{
"name": "CVE-2023-54019",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54019"
},
{
"name": "CVE-2025-22053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22053"
},
{
"name": "CVE-2025-13465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13465"
},
{
"name": "CVE-2025-61664",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61664"
},
{
"name": "CVE-2025-68211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68211"
},
{
"name": "CVE-2026-25702",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25702"
},
{
"name": "CVE-2023-52452",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52452"
},
{
"name": "CVE-2023-42366",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42366"
},
{
"name": "CVE-2022-50863",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50863"
},
{
"name": "CVE-2025-39829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39829"
},
{
"name": "CVE-2024-35843",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35843"
},
{
"name": "CVE-2025-71091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71091"
},
{
"name": "CVE-2025-39781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39781"
},
{
"name": "CVE-2025-39762",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39762"
},
{
"name": "CVE-2024-40999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40999"
},
{
"name": "CVE-2023-53292",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53292"
},
{
"name": "CVE-2023-52576",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52576"
},
{
"name": "CVE-2024-27002",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27002"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2024-57887",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57887"
},
{
"name": "CVE-2025-21730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21730"
},
{
"name": "CVE-2024-35865",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35865"
},
{
"name": "CVE-2025-71184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71184"
},
{
"name": "CVE-2023-52660",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52660"
},
{
"name": "CVE-2024-35995",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35995"
},
{
"name": "CVE-2025-69420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69420"
},
{
"name": "CVE-2023-53371",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53371"
},
{
"name": "CVE-2025-38659",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38659"
},
{
"name": "CVE-2025-68227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68227"
},
{
"name": "CVE-2025-22041",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22041"
},
{
"name": "CVE-2025-40339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40339"
},
{
"name": "CVE-2025-22127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22127"
},
{
"name": "CVE-2025-47273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47273"
},
{
"name": "CVE-2024-27025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27025"
},
{
"name": "CVE-2025-38020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38020"
},
{
"name": "CVE-2024-27011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27011"
},
{
"name": "CVE-2025-15224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15224"
},
{
"name": "CVE-2024-26605",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26605"
},
{
"name": "CVE-2026-27904",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27904"
},
{
"name": "CVE-2024-38543",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38543"
},
{
"name": "CVE-2025-68263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68263"
},
{
"name": "CVE-2023-53187",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53187"
},
{
"name": "CVE-2025-38689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38689"
},
{
"name": "CVE-2025-68800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68800"
},
{
"name": "CVE-2026-1225",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1225"
},
{
"name": "CVE-2025-38275",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38275"
},
{
"name": "CVE-2025-68261",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68261"
},
{
"name": "CVE-2022-48744",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48744"
},
{
"name": "CVE-2025-38070",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38070"
},
{
"name": "CVE-2025-68755",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68755"
},
{
"name": "CVE-2025-62525",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62525"
},
{
"name": "CVE-2025-71238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71238"
},
{
"name": "CVE-2021-0175",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0175"
},
{
"name": "CVE-2024-36012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36012"
},
{
"name": "CVE-2022-48706",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48706"
},
{
"name": "CVE-2025-40334",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40334"
},
{
"name": "CVE-2025-68767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68767"
},
{
"name": "CVE-2024-46716",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46716"
},
{
"name": "CVE-2012-4542",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4542"
},
{
"name": "CVE-2021-3773",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3773"
},
{
"name": "CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"name": "CVE-2022-49267",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49267"
},
{
"name": "CVE-2024-56592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56592"
},
{
"name": "CVE-2025-37854",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37854"
},
{
"name": "CVE-2025-38189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38189"
},
{
"name": "CVE-2022-48628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48628"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
},
{
"name": "CVE-2024-50138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50138"
},
{
"name": "CVE-2025-40319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40319"
},
{
"name": "CVE-2021-44534",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44534"
},
{
"name": "CVE-2025-14831",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14831"
},
{
"name": "CVE-2024-56565",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56565"
},
{
"name": "CVE-2025-68193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68193"
},
{
"name": "CVE-2025-68727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68727"
},
{
"name": "CVE-2024-57872",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57872"
},
{
"name": "CVE-2023-28720",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28720"
},
{
"name": "CVE-2024-53093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53093"
},
{
"name": "CVE-2026-23080",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23080"
},
{
"name": "CVE-2024-46833",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46833"
},
{
"name": "CVE-2024-47703",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47703"
},
{
"name": "CVE-2023-53742",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53742"
},
{
"name": "CVE-2025-38361",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38361"
},
{
"name": "CVE-2025-38041",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38041"
},
{
"name": "CVE-2024-53177",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53177"
},
{
"name": "CVE-2024-56588",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56588"
},
{
"name": "CVE-2023-53452",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53452"
},
{
"name": "CVE-2023-54121",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54121"
},
{
"name": "CVE-2023-6610",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6610"
},
{
"name": "CVE-2023-54261",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54261"
},
{
"name": "CVE-2022-50616",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50616"
},
{
"name": "CVE-2025-66418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66418"
},
{
"name": "CVE-2023-53544",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53544"
},
{
"name": "CVE-2025-68264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68264"
},
{
"name": "CVE-2024-49911",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49911"
},
{
"name": "CVE-2026-23154",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23154"
},
{
"name": "CVE-2022-50708",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50708"
},
{
"name": "CVE-2026-3784",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3784"
},
{
"name": "CVE-2025-68764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68764"
},
{
"name": "CVE-2025-9301",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9301"
},
{
"name": "CVE-2025-11226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11226"
}
],
"initial_release_date": "2026-03-20T00:00:00",
"last_revision_date": "2026-03-20T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0326",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-03-20T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37233",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37233"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37237",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37237"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37236",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37236"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37246",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37246"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37235",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37235"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37229",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37229"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37226",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37226"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37230",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37230"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37242",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37242"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37228",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37228"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37240",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37240"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37243",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37243"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37234",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37234"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37231",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37231"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37239",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37239"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37227",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37227"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37232",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37232"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37247",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37247"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37241",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37241"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37238",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37238"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37244",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37244"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37245",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37245"
}
]
}
CERTFR-2026-AVI-0331
Vulnerability from certfr_avis - Published: 2026-03-20 - Updated: 2026-03-20
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Certaines d'entre elles permettent à un attaquant de provoquer une élévation de privilèges, une atteinte à la confidentialité des données et une atteinte à l'intégrité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 20.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 24.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 18.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 25.10",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 22.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-36903",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36903"
},
{
"name": "CVE-2025-68234",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68234"
},
{
"name": "CVE-2025-40166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40166"
},
{
"name": "CVE-2025-71075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71075"
},
{
"name": "CVE-2025-40273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40273"
},
{
"name": "CVE-2025-68230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68230"
},
{
"name": "CVE-2025-39992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39992"
},
{
"name": "CVE-2026-23202",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23202"
},
{
"name": "CVE-2025-68324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68324"
},
{
"name": "CVE-2025-39987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39987"
},
{
"name": "CVE-2025-71086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71086"
},
{
"name": "CVE-2025-39812",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39812"
},
{
"name": "CVE-2025-40156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40156"
},
{
"name": "CVE-2025-68342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68342"
},
{
"name": "CVE-2025-68374",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68374"
},
{
"name": "CVE-2025-40137",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40137"
},
{
"name": "CVE-2025-22107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22107"
},
{
"name": "CVE-2025-68373",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68373"
},
{
"name": "CVE-2025-39808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39808"
},
{
"name": "CVE-2025-68286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68286"
},
{
"name": "CVE-2025-68749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68749"
},
{
"name": "CVE-2025-40057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40057"
},
{
"name": "CVE-2025-71094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71094"
},
{
"name": "CVE-2025-68788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68788"
},
{
"name": "CVE-2025-40055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40055"
},
{
"name": "CVE-2025-39876",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39876"
},
{
"name": "CVE-2025-40314",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40314"
},
{
"name": "CVE-2025-40029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40029"
},
{
"name": "CVE-2025-40037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40037"
},
{
"name": "CVE-2025-40306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40306"
},
{
"name": "CVE-2025-40008",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40008"
},
{
"name": "CVE-2025-39947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39947"
},
{
"name": "CVE-2025-40048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40048"
},
{
"name": "CVE-2025-68292",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68292"
},
{
"name": "CVE-2025-40254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40254"
},
{
"name": "CVE-2025-71064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71064"
},
{
"name": "CVE-2025-40219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40219"
},
{
"name": "CVE-2025-68200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68200"
},
{
"name": "CVE-2025-39902",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39902"
},
{
"name": "CVE-2025-40043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40043"
},
{
"name": "CVE-2025-68176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68176"
},
{
"name": "CVE-2025-68741",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68741"
},
{
"name": "CVE-2025-68204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68204"
},
{
"name": "CVE-2025-68795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68795"
},
{
"name": "CVE-2025-68349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68349"
},
{
"name": "CVE-2025-39948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39948"
},
{
"name": "CVE-2025-39826",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39826"
},
{
"name": "CVE-2025-68380",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68380"
},
{
"name": "CVE-2025-68359",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68359"
},
{
"name": "CVE-2025-39973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39973"
},
{
"name": "CVE-2025-39881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39881"
},
{
"name": "CVE-2025-68283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68283"
},
{
"name": "CVE-2021-47599",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47599"
},
{
"name": "CVE-2025-68246",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68246"
},
{
"name": "CVE-2025-68339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68339"
},
{
"name": "CVE-2025-40287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40287"
},
{
"name": "CVE-2025-39943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39943"
},
{
"name": "CVE-2025-39945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39945"
},
{
"name": "CVE-2026-22992",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22992"
},
{
"name": "CVE-2022-49465",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49465"
},
{
"name": "CVE-2025-39883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39883"
},
{
"name": "CVE-2025-68295",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68295"
},
{
"name": "CVE-2025-23129",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23129"
},
{
"name": "CVE-2025-68728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68728"
},
{
"name": "CVE-2025-68364",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68364"
},
{
"name": "CVE-2025-40100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40100"
},
{
"name": "CVE-2025-71087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71087"
},
{
"name": "CVE-2025-40285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40285"
},
{
"name": "CVE-2025-39827",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39827"
},
{
"name": "CVE-2025-22106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22106"
},
{
"name": "CVE-2025-68287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68287"
},
{
"name": "CVE-2025-40240",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40240"
},
{
"name": "CVE-2025-39828",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39828"
},
{
"name": "CVE-2025-40081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40081"
},
{
"name": "CVE-2025-68746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68746"
},
{
"name": "CVE-2025-71133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71133"
},
{
"name": "CVE-2025-40026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40026"
},
{
"name": "CVE-2025-40153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40153"
},
{
"name": "CVE-2025-40103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40103"
},
{
"name": "CVE-2026-23020",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23020"
},
{
"name": "CVE-2025-40294",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40294"
},
{
"name": "CVE-2025-68796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68796"
},
{
"name": "CVE-2025-40016",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40016"
},
{
"name": "CVE-2025-40121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40121"
},
{
"name": "CVE-2025-40265",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40265"
},
{
"name": "CVE-2025-40312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40312"
},
{
"name": "CVE-2025-40204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40204"
},
{
"name": "CVE-2025-68220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68220"
},
{
"name": "CVE-2025-22125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22125"
},
{
"name": "CVE-2025-40171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40171"
},
{
"name": "CVE-2025-68302",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68302"
},
{
"name": "CVE-2025-68238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68238"
},
{
"name": "CVE-2025-68297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68297"
},
{
"name": "CVE-2025-68299",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68299"
},
{
"name": "CVE-2025-40221",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40221"
},
{
"name": "CVE-2025-68804",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68804"
},
{
"name": "CVE-2025-68769",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68769"
},
{
"name": "CVE-2025-39811",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39811"
},
{
"name": "CVE-2025-40056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40056"
},
{
"name": "CVE-2025-39911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39911"
},
{
"name": "CVE-2025-40125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40125"
},
{
"name": "CVE-2025-40350",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40350"
},
{
"name": "CVE-2025-40309",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40309"
},
{
"name": "CVE-2025-40349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40349"
},
{
"name": "CVE-2025-40052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40052"
},
{
"name": "CVE-2025-68334",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68334"
},
{
"name": "CVE-2025-40343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40343"
},
{
"name": "CVE-2025-68173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68173"
},
{
"name": "CVE-2025-22103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22103"
},
{
"name": "CVE-2025-68307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68307"
},
{
"name": "CVE-2025-40308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40308"
},
{
"name": "CVE-2025-40187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40187"
},
{
"name": "CVE-2025-40315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40315"
},
{
"name": "CVE-2025-37860",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37860"
},
{
"name": "CVE-2025-39913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39913"
},
{
"name": "CVE-2025-68231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68231"
},
{
"name": "CVE-2025-39950",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39950"
},
{
"name": "CVE-2025-40092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40092"
},
{
"name": "CVE-2025-71098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71098"
},
{
"name": "CVE-2025-40251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40251"
},
{
"name": "CVE-2025-71078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71078"
},
{
"name": "CVE-2025-39967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39967"
},
{
"name": "CVE-2025-68184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68184"
},
{
"name": "CVE-2025-40107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40107"
},
{
"name": "CVE-2025-71083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71083"
},
{
"name": "CVE-2025-40115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40115"
},
{
"name": "CVE-2025-68813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68813"
},
{
"name": "CVE-2026-23047",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23047"
},
{
"name": "CVE-2025-22121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22121"
},
{
"name": "CVE-2025-68265",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68265"
},
{
"name": "CVE-2025-71085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71085"
},
{
"name": "CVE-2025-39920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39920"
},
{
"name": "CVE-2025-40058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40058"
},
{
"name": "CVE-2025-68344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68344"
},
{
"name": "CVE-2025-40347",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40347"
},
{
"name": "CVE-2025-71154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71154"
},
{
"name": "CVE-2025-40198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40198"
},
{
"name": "CVE-2025-39942",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39942"
},
{
"name": "CVE-2025-68310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68310"
},
{
"name": "CVE-2025-68179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68179"
},
{
"name": "CVE-2025-68229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68229"
},
{
"name": "CVE-2025-68257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68257"
},
{
"name": "CVE-2025-39929",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39929"
},
{
"name": "CVE-2025-39949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39949"
},
{
"name": "CVE-2025-71084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71084"
},
{
"name": "CVE-2025-40173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40173"
},
{
"name": "CVE-2025-68321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68321"
},
{
"name": "CVE-2025-68347",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68347"
},
{
"name": "CVE-2025-40010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40010"
},
{
"name": "CVE-2025-39944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39944"
},
{
"name": "CVE-2025-39923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39923"
},
{
"name": "CVE-2025-68235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68235"
},
{
"name": "CVE-2025-39866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39866"
},
{
"name": "CVE-2025-39843",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39843"
},
{
"name": "CVE-2025-40311",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40311"
},
{
"name": "CVE-2025-68814",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68814"
},
{
"name": "CVE-2025-40237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40237"
},
{
"name": "CVE-2025-68780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68780"
},
{
"name": "CVE-2025-39953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39953"
},
{
"name": "CVE-2025-71081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71081"
},
{
"name": "CVE-2025-68738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68738"
},
{
"name": "CVE-2025-40167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40167"
},
{
"name": "CVE-2025-38105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38105"
},
{
"name": "CVE-2025-39969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39969"
},
{
"name": "CVE-2025-71121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71121"
},
{
"name": "CVE-2025-40194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40194"
},
{
"name": "CVE-2025-40333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40333"
},
{
"name": "CVE-2025-38022",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38022"
},
{
"name": "CVE-2025-40245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40245"
},
{
"name": "CVE-2025-39899",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39899"
},
{
"name": "CVE-2025-68754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68754"
},
{
"name": "CVE-2025-40360",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40360"
},
{
"name": "CVE-2025-71136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71136"
},
{
"name": "CVE-2025-22105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22105"
},
{
"name": "CVE-2025-68354",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68354"
},
{
"name": "CVE-2025-68801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68801"
},
{
"name": "CVE-2025-21833",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21833"
},
{
"name": "CVE-2025-40104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40104"
},
{
"name": "CVE-2025-68258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68258"
},
{
"name": "CVE-2025-39853",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39853"
},
{
"name": "CVE-2025-40001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40001"
},
{
"name": "CVE-2025-39871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39871"
},
{
"name": "CVE-2025-39857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39857"
},
{
"name": "CVE-2025-38709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38709"
},
{
"name": "CVE-2025-40035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40035"
},
{
"name": "CVE-2025-40322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40322"
},
{
"name": "CVE-2025-39988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39988"
},
{
"name": "CVE-2025-40313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40313"
},
{
"name": "CVE-2025-39865",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39865"
},
{
"name": "CVE-2025-40233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40233"
},
{
"name": "CVE-2025-40172",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40172"
},
{
"name": "CVE-2025-40020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40020"
},
{
"name": "CVE-2025-40188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40188"
},
{
"name": "CVE-2025-40271",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40271"
},
{
"name": "CVE-2025-68306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68306"
},
{
"name": "CVE-2025-39877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39877"
},
{
"name": "CVE-2026-22991",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22991"
},
{
"name": "CVE-2025-38502",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38502"
},
{
"name": "CVE-2025-68300",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68300"
},
{
"name": "CVE-2025-39886",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39886"
},
{
"name": "CVE-2025-68763",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68763"
},
{
"name": "CVE-2025-68294",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68294"
},
{
"name": "CVE-2025-40290",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40290"
},
{
"name": "CVE-2025-68308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68308"
},
{
"name": "CVE-2025-40249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40249"
},
{
"name": "CVE-2025-40242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40242"
},
{
"name": "CVE-2025-39838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39838"
},
{
"name": "CVE-2025-39823",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39823"
},
{
"name": "CVE-2025-68198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68198"
},
{
"name": "CVE-2025-39864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39864"
},
{
"name": "CVE-2025-40013",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40013"
},
{
"name": "CVE-2025-68190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68190"
},
{
"name": "CVE-2025-40169",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40169"
},
{
"name": "CVE-2025-39824",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39824"
},
{
"name": "CVE-2026-23207",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23207"
},
{
"name": "CVE-2025-40252",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40252"
},
{
"name": "CVE-2025-68218",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68218"
},
{
"name": "CVE-2025-40049",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40049"
},
{
"name": "CVE-2025-68255",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68255"
},
{
"name": "CVE-2025-68322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68322"
},
{
"name": "CVE-2026-22980",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22980"
},
{
"name": "CVE-2025-39927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39927"
},
{
"name": "CVE-2025-40024",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40024"
},
{
"name": "CVE-2025-40238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40238"
},
{
"name": "CVE-2025-40277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40277"
},
{
"name": "CVE-2025-40070",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40070"
},
{
"name": "CVE-2025-40106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40106"
},
{
"name": "CVE-2025-40272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40272"
},
{
"name": "CVE-2025-39842",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39842"
},
{
"name": "CVE-2025-40047",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40047"
},
{
"name": "CVE-2025-71093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71093"
},
{
"name": "CVE-2025-71102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71102"
},
{
"name": "CVE-2025-68759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68759"
},
{
"name": "CVE-2026-23019",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23019"
},
{
"name": "CVE-2025-39815",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39815"
},
{
"name": "CVE-2025-40345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40345"
},
{
"name": "CVE-2025-40205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40205"
},
{
"name": "CVE-2025-39849",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39849"
},
{
"name": "CVE-2025-40033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40033"
},
{
"name": "CVE-2025-68733",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68733"
},
{
"name": "CVE-2025-39894",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39894"
},
{
"name": "CVE-2025-39861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39861"
},
{
"name": "CVE-2025-68215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68215"
},
{
"name": "CVE-2025-40269",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40269"
},
{
"name": "CVE-2025-68228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68228"
},
{
"name": "CVE-2025-68335",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68335"
},
{
"name": "CVE-2025-71079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71079"
},
{
"name": "CVE-2025-62626",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62626"
},
{
"name": "CVE-2025-39940",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39940"
},
{
"name": "CVE-2025-68338",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68338"
},
{
"name": "CVE-2025-68304",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68304"
},
{
"name": "CVE-2025-68370",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68370"
},
{
"name": "CVE-2025-39977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39977"
},
{
"name": "CVE-2025-68330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68330"
},
{
"name": "CVE-2025-40027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40027"
},
{
"name": "CVE-2025-39885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39885"
},
{
"name": "CVE-2025-68180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68180"
},
{
"name": "CVE-2025-68343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68343"
},
{
"name": "CVE-2025-68726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68726"
},
{
"name": "CVE-2025-21780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21780"
},
{
"name": "CVE-2025-68201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68201"
},
{
"name": "CVE-2025-40289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40289"
},
{
"name": "CVE-2025-68785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68785"
},
{
"name": "CVE-2024-37354",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37354"
},
{
"name": "CVE-2025-68808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68808"
},
{
"name": "CVE-2025-68748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68748"
},
{
"name": "CVE-2025-68223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68223"
},
{
"name": "CVE-2025-68783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68783"
},
{
"name": "CVE-2025-39970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39970"
},
{
"name": "CVE-2025-40292",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40292"
},
{
"name": "CVE-2025-71147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71147"
},
{
"name": "CVE-2025-40032",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40032"
},
{
"name": "CVE-2025-39981",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39981"
},
{
"name": "CVE-2025-68724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68724"
},
{
"name": "CVE-2025-39994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39994"
},
{
"name": "CVE-2022-48875",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48875"
},
{
"name": "CVE-2025-68797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68797"
},
{
"name": "CVE-2025-38627",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38627"
},
{
"name": "CVE-2024-49968",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49968"
},
{
"name": "CVE-2025-68358",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68358"
},
{
"name": "CVE-2025-40206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40206"
},
{
"name": "CVE-2025-40218",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40218"
},
{
"name": "CVE-2025-40088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40088"
},
{
"name": "CVE-2025-40220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40220"
},
{
"name": "CVE-2025-39845",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39845"
},
{
"name": "CVE-2025-68237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68237"
},
{
"name": "CVE-2025-40257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40257"
},
{
"name": "CVE-2025-68259",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68259"
},
{
"name": "CVE-2025-71125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71125"
},
{
"name": "CVE-2025-71108",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71108"
},
{
"name": "CVE-2025-71069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71069"
},
{
"name": "CVE-2025-68312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68312"
},
{
"name": "CVE-2025-68284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68284"
},
{
"name": "CVE-2025-40062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40062"
},
{
"name": "CVE-2025-68194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68194"
},
{
"name": "CVE-2025-68356",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68356"
},
{
"name": "CVE-2025-40067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40067"
},
{
"name": "CVE-2025-40109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40109"
},
{
"name": "CVE-2025-40101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40101"
},
{
"name": "CVE-2025-40006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40006"
},
{
"name": "CVE-2025-40038",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40038"
},
{
"name": "CVE-2025-68183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68183"
},
{
"name": "CVE-2025-39805",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39805"
},
{
"name": "CVE-2025-68774",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68774"
},
{
"name": "CVE-2025-40263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40263"
},
{
"name": "CVE-2025-40353",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40353"
},
{
"name": "CVE-2025-40011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40011"
},
{
"name": "CVE-2025-40085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40085"
},
{
"name": "CVE-2025-71180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71180"
},
{
"name": "CVE-2025-68244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68244"
},
{
"name": "CVE-2025-40231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40231"
},
{
"name": "CVE-2024-46830",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46830"
},
{
"name": "CVE-2024-47666",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47666"
},
{
"name": "CVE-2025-40278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40278"
},
{
"name": "CVE-2025-22113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22113"
},
{
"name": "CVE-2025-40176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40176"
},
{
"name": "CVE-2025-40342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40342"
},
{
"name": "CVE-2025-71128",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71128"
},
{
"name": "CVE-2025-71082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71082"
},
{
"name": "CVE-2025-68222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68222"
},
{
"name": "CVE-2025-68743",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68743"
},
{
"name": "CVE-2025-68765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68765"
},
{
"name": "CVE-2025-23143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23143"
},
{
"name": "CVE-2025-71132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71132"
},
{
"name": "CVE-2025-40193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40193"
},
{
"name": "CVE-2025-71077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71077"
},
{
"name": "CVE-2024-36927",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36927"
},
{
"name": "CVE-2025-40279",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40279"
},
{
"name": "CVE-2025-68328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68328"
},
{
"name": "CVE-2025-40201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40201"
},
{
"name": "CVE-2025-40084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40084"
},
{
"name": "CVE-2025-22111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22111"
},
{
"name": "CVE-2025-68232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68232"
},
{
"name": "CVE-2025-68311",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68311"
},
{
"name": "CVE-2025-71114",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71114"
},
{
"name": "CVE-2025-68348",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68348"
},
{
"name": "CVE-2025-68744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68744"
},
{
"name": "CVE-2025-71182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71182"
},
{
"name": "CVE-2025-68320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68320"
},
{
"name": "CVE-2025-40341",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40341"
},
{
"name": "CVE-2025-40183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40183"
},
{
"name": "CVE-2026-22990",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22990"
},
{
"name": "CVE-2025-68376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68376"
},
{
"name": "CVE-2025-68172",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68172"
},
{
"name": "CVE-2025-39998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39998"
},
{
"name": "CVE-2025-68821",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68821"
},
{
"name": "CVE-2025-40134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40134"
},
{
"name": "CVE-2025-68325",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68325"
},
{
"name": "CVE-2025-39968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39968"
},
{
"name": "CVE-2025-40358",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40358"
},
{
"name": "CVE-2025-40165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40165"
},
{
"name": "CVE-2025-68341",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68341"
},
{
"name": "CVE-2025-68296",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68296"
},
{
"name": "CVE-2025-68361",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68361"
},
{
"name": "CVE-2025-40328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40328"
},
{
"name": "CVE-2025-68332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68332"
},
{
"name": "CVE-2025-39986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39986"
},
{
"name": "CVE-2025-71104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71104"
},
{
"name": "CVE-2026-22978",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22978"
},
{
"name": "CVE-2025-39901",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39901"
},
{
"name": "CVE-2025-40283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40283"
},
{
"name": "CVE-2025-39955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39955"
},
{
"name": "CVE-2025-40324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40324"
},
{
"name": "CVE-2025-68378",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68378"
},
{
"name": "CVE-2025-68752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68752"
},
{
"name": "CVE-2025-38129",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38129"
},
{
"name": "CVE-2025-40250",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40250"
},
{
"name": "CVE-2025-40264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40264"
},
{
"name": "CVE-2025-40255",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40255"
},
{
"name": "CVE-2025-40246",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40246"
},
{
"name": "CVE-2025-68367",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68367"
},
{
"name": "CVE-2025-40226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40226"
},
{
"name": "CVE-2025-40078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40078"
},
{
"name": "CVE-2025-68820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68820"
},
{
"name": "CVE-2025-68756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68756"
},
{
"name": "CVE-2025-40321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40321"
},
{
"name": "CVE-2025-68360",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68360"
},
{
"name": "CVE-2025-40116",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40116"
},
{
"name": "CVE-2025-39895",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39895"
},
{
"name": "CVE-2025-68249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68249"
},
{
"name": "CVE-2025-68740",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68740"
},
{
"name": "CVE-2025-39934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39934"
},
{
"name": "CVE-2025-39978",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39978"
},
{
"name": "CVE-2025-40179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40179"
},
{
"name": "CVE-2025-68742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68742"
},
{
"name": "CVE-2025-40127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40127"
},
{
"name": "CVE-2025-40282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40282"
},
{
"name": "CVE-2025-39996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39996"
},
{
"name": "CVE-2025-40053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40053"
},
{
"name": "CVE-2025-39951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39951"
},
{
"name": "CVE-2025-40120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40120"
},
{
"name": "CVE-2025-68816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68816"
},
{
"name": "CVE-2025-39914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39914"
},
{
"name": "CVE-2025-68192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68192"
},
{
"name": "CVE-2025-39697",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39697"
},
{
"name": "CVE-2025-68379",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68379"
},
{
"name": "CVE-2025-68256",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68256"
},
{
"name": "CVE-2025-68777",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68777"
},
{
"name": "CVE-2025-68254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68254"
},
{
"name": "CVE-2025-39938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39938"
},
{
"name": "CVE-2025-40243",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40243"
},
{
"name": "CVE-2025-40196",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40196"
},
{
"name": "CVE-2025-39982",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39982"
},
{
"name": "CVE-2025-40129",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40129"
},
{
"name": "CVE-2025-39965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39965"
},
{
"name": "CVE-2025-38556",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38556"
},
{
"name": "CVE-2025-68171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68171"
},
{
"name": "CVE-2025-39932",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39932"
},
{
"name": "CVE-2025-40301",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40301"
},
{
"name": "CVE-2025-40040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40040"
},
{
"name": "CVE-2025-39810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39810"
},
{
"name": "CVE-2026-22982",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22982"
},
{
"name": "CVE-2025-68298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68298"
},
{
"name": "CVE-2025-40207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40207"
},
{
"name": "CVE-2025-40095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40095"
},
{
"name": "CVE-2025-68747",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68747"
},
{
"name": "CVE-2025-71118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71118"
},
{
"name": "CVE-2025-39860",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39860"
},
{
"name": "CVE-2025-40286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40286"
},
{
"name": "CVE-2025-68327",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68327"
},
{
"name": "CVE-2025-40318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40318"
},
{
"name": "CVE-2025-40266",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40266"
},
{
"name": "CVE-2025-68241",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68241"
},
{
"name": "CVE-2025-40118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40118"
},
{
"name": "CVE-2025-40021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40021"
},
{
"name": "CVE-2025-39839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39839"
},
{
"name": "CVE-2025-68734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68734"
},
{
"name": "CVE-2025-68776",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68776"
},
{
"name": "CVE-2025-71066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71066"
},
{
"name": "CVE-2025-39848",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39848"
},
{
"name": "CVE-2025-68799",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68799"
},
{
"name": "CVE-2025-68345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68345"
},
{
"name": "CVE-2025-40044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40044"
},
{
"name": "CVE-2025-71097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71097"
},
{
"name": "CVE-2025-40105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40105"
},
{
"name": "CVE-2025-68288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68288"
},
{
"name": "CVE-2025-68739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68739"
},
{
"name": "CVE-2025-39916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39916"
},
{
"name": "CVE-2025-40112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40112"
},
{
"name": "CVE-2025-40079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40079"
},
{
"name": "CVE-2025-40260",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40260"
},
{
"name": "CVE-2025-40310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40310"
},
{
"name": "CVE-2025-40083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40083"
},
{
"name": "CVE-2025-71111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71111"
},
{
"name": "CVE-2025-39971",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39971"
},
{
"name": "CVE-2025-40154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40154"
},
{
"name": "CVE-2025-40331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40331"
},
{
"name": "CVE-2025-68337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68337"
},
{
"name": "CVE-2025-40093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40093"
},
{
"name": "CVE-2025-39825",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39825"
},
{
"name": "CVE-2025-71131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71131"
},
{
"name": "CVE-2025-39852",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39852"
},
{
"name": "CVE-2025-71116",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71116"
},
{
"name": "CVE-2025-40235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40235"
},
{
"name": "CVE-2025-39991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39991"
},
{
"name": "CVE-2025-68281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68281"
},
{
"name": "CVE-2025-68729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68729"
},
{
"name": "CVE-2025-68208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68208"
},
{
"name": "CVE-2025-68362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68362"
},
{
"name": "CVE-2025-68236",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68236"
},
{
"name": "CVE-2025-68333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68333"
},
{
"name": "CVE-2025-39806",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39806"
},
{
"name": "CVE-2025-68290",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68290"
},
{
"name": "CVE-2025-40280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40280"
},
{
"name": "CVE-2025-40099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40099"
},
{
"name": "CVE-2025-40031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40031"
},
{
"name": "CVE-2025-40180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40180"
},
{
"name": "CVE-2025-40293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40293"
},
{
"name": "CVE-2025-68751",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68751"
},
{
"name": "CVE-2025-68803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68803"
},
{
"name": "CVE-2025-39851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39851"
},
{
"name": "CVE-2025-68331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68331"
},
{
"name": "CVE-2025-40126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40126"
},
{
"name": "CVE-2025-39972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39972"
},
{
"name": "CVE-2026-22976",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22976"
},
{
"name": "CVE-2025-68760",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68760"
},
{
"name": "CVE-2025-68305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68305"
},
{
"name": "CVE-2025-68352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68352"
},
{
"name": "CVE-2025-68214",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68214"
},
{
"name": "CVE-2025-40320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40320"
},
{
"name": "CVE-2025-39870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39870"
},
{
"name": "CVE-2025-40247",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40247"
},
{
"name": "CVE-2025-68375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68375"
},
{
"name": "CVE-2025-68753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68753"
},
{
"name": "CVE-2025-68369",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68369"
},
{
"name": "CVE-2025-39807",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39807"
},
{
"name": "CVE-2025-71112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71112"
},
{
"name": "CVE-2025-22022",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22022"
},
{
"name": "CVE-2025-40192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40192"
},
{
"name": "CVE-2025-40200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40200"
},
{
"name": "CVE-2025-68818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68818"
},
{
"name": "CVE-2025-40124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40124"
},
{
"name": "CVE-2025-39880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39880"
},
{
"name": "CVE-2025-40094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40094"
},
{
"name": "CVE-2025-40160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40160"
},
{
"name": "CVE-2025-40284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40284"
},
{
"name": "CVE-2025-40077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40077"
},
{
"name": "CVE-2024-41014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41014"
},
{
"name": "CVE-2025-40071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40071"
},
{
"name": "CVE-2025-68329",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68329"
},
{
"name": "CVE-2025-68366",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68366"
},
{
"name": "CVE-2025-40305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40305"
},
{
"name": "CVE-2025-40080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40080"
},
{
"name": "CVE-2025-39846",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39846"
},
{
"name": "CVE-2025-68815",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68815"
},
{
"name": "CVE-2025-40215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40215"
},
{
"name": "CVE-2025-40307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40307"
},
{
"name": "CVE-2025-40111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40111"
},
{
"name": "CVE-2025-68346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68346"
},
{
"name": "CVE-2025-40211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40211"
},
{
"name": "CVE-2025-40068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40068"
},
{
"name": "CVE-2025-68315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68315"
},
{
"name": "CVE-2025-39850",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39850"
},
{
"name": "CVE-2022-49072",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49072"
},
{
"name": "CVE-2025-40042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40042"
},
{
"name": "CVE-2025-40155",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40155"
},
{
"name": "CVE-2025-71096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71096"
},
{
"name": "CVE-2025-39844",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39844"
},
{
"name": "CVE-2025-71105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71105"
},
{
"name": "CVE-2025-68266",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68266"
},
{
"name": "CVE-2025-68771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68771"
},
{
"name": "CVE-2025-39961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39961"
},
{
"name": "CVE-2025-68363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68363"
},
{
"name": "CVE-2025-40248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40248"
},
{
"name": "CVE-2026-22984",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22984"
},
{
"name": "CVE-2024-49927",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49927"
},
{
"name": "CVE-2025-68303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68303"
},
{
"name": "CVE-2025-39863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39863"
},
{
"name": "CVE-2025-40259",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40259"
},
{
"name": "CVE-2025-68757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68757"
},
{
"name": "CVE-2025-71068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71068"
},
{
"name": "CVE-2025-23130",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23130"
},
{
"name": "CVE-2025-40329",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40329"
},
{
"name": "CVE-2025-39957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39957"
},
{
"name": "CVE-2025-39931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39931"
},
{
"name": "CVE-2026-22977",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22977"
},
{
"name": "CVE-2025-39937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39937"
},
{
"name": "CVE-2025-68766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68766"
},
{
"name": "CVE-2025-39817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39817"
},
{
"name": "CVE-2025-40060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40060"
},
{
"name": "CVE-2025-39891",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39891"
},
{
"name": "CVE-2025-40059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40059"
},
{
"name": "CVE-2025-68168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68168"
},
{
"name": "CVE-2025-39897",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39897"
},
{
"name": "CVE-2025-68326",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68326"
},
{
"name": "CVE-2025-68372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68372"
},
{
"name": "CVE-2025-22124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22124"
},
{
"name": "CVE-2025-68313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68313"
},
{
"name": "CVE-2025-71137",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71137"
},
{
"name": "CVE-2025-40123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40123"
},
{
"name": "CVE-2025-68301",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68301"
},
{
"name": "CVE-2025-39854",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39854"
},
{
"name": "CVE-2025-68217",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68217"
},
{
"name": "CVE-2025-40178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40178"
},
{
"name": "CVE-2025-68212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68212"
},
{
"name": "CVE-2025-68289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68289"
},
{
"name": "CVE-2025-40363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40363"
},
{
"name": "CVE-2025-39869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39869"
},
{
"name": "CVE-2025-40253",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40253"
},
{
"name": "CVE-2025-39985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39985"
},
{
"name": "CVE-2025-68245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68245"
},
{
"name": "CVE-2025-68730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68730"
},
{
"name": "CVE-2025-68213",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68213"
},
{
"name": "CVE-2025-39952",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39952"
},
{
"name": "CVE-2025-40317",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40317"
},
{
"name": "CVE-2025-68233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68233"
},
{
"name": "CVE-2025-71120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71120"
},
{
"name": "CVE-2025-68282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68282"
},
{
"name": "CVE-2025-68225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68225"
},
{
"name": "CVE-2025-68787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68787"
},
{
"name": "CVE-2025-23133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23133"
},
{
"name": "CVE-2025-68782",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68782"
},
{
"name": "CVE-2025-68177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68177"
},
{
"name": "CVE-2025-68758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68758"
},
{
"name": "CVE-2025-68191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68191"
},
{
"name": "CVE-2025-71113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71113"
},
{
"name": "CVE-2025-71127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71127"
},
{
"name": "CVE-2025-40141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40141"
},
{
"name": "CVE-2025-68340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68340"
},
{
"name": "CVE-2025-39678",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39678"
},
{
"name": "CVE-2025-68219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68219"
},
{
"name": "CVE-2025-40288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40288"
},
{
"name": "CVE-2025-40258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40258"
},
{
"name": "CVE-2025-40281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40281"
},
{
"name": "CVE-2025-68185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68185"
},
{
"name": "CVE-2025-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40304"
},
{
"name": "CVE-2025-40110",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40110"
},
{
"name": "CVE-2025-40268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40268"
},
{
"name": "CVE-2025-39980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39980"
},
{
"name": "CVE-2025-40009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40009"
},
{
"name": "CVE-2025-68336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68336"
},
{
"name": "CVE-2025-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40303"
},
{
"name": "CVE-2025-68323",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68323"
},
{
"name": "CVE-2025-68178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68178"
},
{
"name": "CVE-2025-40337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40337"
},
{
"name": "CVE-2025-40346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40346"
},
{
"name": "CVE-2025-40036",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40036"
},
{
"name": "CVE-2025-68221",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68221"
},
{
"name": "CVE-2025-39832",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39832"
},
{
"name": "CVE-2025-40000",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40000"
},
{
"name": "CVE-2025-40262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40262"
},
{
"name": "CVE-2025-68262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68262"
},
{
"name": "CVE-2025-39813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39813"
},
{
"name": "CVE-2025-68819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68819"
},
{
"name": "CVE-2025-40261",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40261"
},
{
"name": "CVE-2025-38643",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38643"
},
{
"name": "CVE-2025-40030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40030"
},
{
"name": "CVE-2025-40244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40244"
},
{
"name": "CVE-2025-39995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39995"
},
{
"name": "CVE-2025-68735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68735"
},
{
"name": "CVE-2026-23021",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23021"
},
{
"name": "CVE-2025-39847",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39847"
},
{
"name": "CVE-2025-39819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39819"
},
{
"name": "CVE-2025-68732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68732"
},
{
"name": "CVE-2025-40323",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40323"
},
{
"name": "CVE-2025-39835",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39835"
},
{
"name": "CVE-2025-68285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68285"
},
{
"name": "CVE-2025-40096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40096"
},
{
"name": "CVE-2024-56640",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56640"
},
{
"name": "CVE-2025-39841",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39841"
},
{
"name": "CVE-2025-68371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68371"
},
{
"name": "CVE-2025-40275",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40275"
},
{
"name": "CVE-2025-39907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39907"
},
{
"name": "CVE-2025-39829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39829"
},
{
"name": "CVE-2025-71091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71091"
},
{
"name": "CVE-2025-39909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39909"
},
{
"name": "CVE-2025-68227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68227"
},
{
"name": "CVE-2025-40339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40339"
},
{
"name": "CVE-2025-40140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40140"
},
{
"name": "CVE-2025-40223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40223"
},
{
"name": "CVE-2025-40061",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40061"
},
{
"name": "CVE-2025-68263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68263"
},
{
"name": "CVE-2025-68293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68293"
},
{
"name": "CVE-2025-68800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68800"
},
{
"name": "CVE-2025-68261",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68261"
},
{
"name": "CVE-2025-68755",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68755"
},
{
"name": "CVE-2025-68767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68767"
},
{
"name": "CVE-2022-49267",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49267"
},
{
"name": "CVE-2025-39873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39873"
},
{
"name": "CVE-2025-40159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40159"
},
{
"name": "CVE-2025-40319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40319"
},
{
"name": "CVE-2025-68727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68727"
},
{
"name": "CVE-2025-39836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39836"
},
{
"name": "CVE-2025-40051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40051"
},
{
"name": "CVE-2025-40351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40351"
},
{
"name": "CVE-2025-68264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68264"
},
{
"name": "CVE-2025-40087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40087"
},
{
"name": "CVE-2025-68762",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68762"
},
{
"name": "CVE-2025-68764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68764"
}
],
"initial_release_date": "2026-03-20T00:00:00",
"last_revision_date": "2026-03-20T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0331",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-03-20T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux d\u0027Ubuntu. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": "2026-03-16",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8096-2",
"url": "https://ubuntu.com/security/notices/USN-8096-2"
},
{
"published_at": "2026-03-16",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8095-1",
"url": "https://ubuntu.com/security/notices/USN-8095-1"
},
{
"published_at": "2026-03-17",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8096-4",
"url": "https://ubuntu.com/security/notices/USN-8096-4"
},
{
"published_at": "2026-03-16",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8098-1",
"url": "https://ubuntu.com/security/notices/USN-8098-1"
},
{
"published_at": "2026-03-17",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8094-2",
"url": "https://ubuntu.com/security/notices/USN-8094-2"
},
{
"published_at": "2026-03-16",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8100-1",
"url": "https://ubuntu.com/security/notices/USN-8100-1"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8107-1",
"url": "https://ubuntu.com/security/notices/USN-8107-1"
},
{
"published_at": "2026-03-16",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8094-1",
"url": "https://ubuntu.com/security/notices/USN-8094-1"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8098-3",
"url": "https://ubuntu.com/security/notices/USN-8098-3"
},
{
"published_at": "2026-03-16",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8095-2",
"url": "https://ubuntu.com/security/notices/USN-8095-2"
},
{
"published_at": "2026-03-17",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8096-3",
"url": "https://ubuntu.com/security/notices/USN-8096-3"
},
{
"published_at": "2026-03-16",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8096-1",
"url": "https://ubuntu.com/security/notices/USN-8096-1"
},
{
"published_at": "2026-03-17",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8095-3",
"url": "https://ubuntu.com/security/notices/USN-8095-3"
},
{
"published_at": "2026-03-17",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8098-2",
"url": "https://ubuntu.com/security/notices/USN-8098-2"
}
]
}
CERTFR-2025-AVI-0966
Vulnerability from certfr_avis - Published: 2025-11-05 - Updated: 2025-11-05
De multiples vulnérabilités ont été découvertes dans les produits Microsoft. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | N/A | cbl2 golang 1.22.7-5 | ||
| Microsoft | N/A | azl3 golang 1.23.12-1 | ||
| Microsoft | N/A | cbl2 python-tensorboard 2.11.0-3 | ||
| Microsoft | N/A | azl3 moby-engine 25.0.3-13 | ||
| Microsoft | N/A | azl3 python-tensorboard 2.16.2-6 | ||
| Microsoft | N/A | azl3 kernel 6.6.104.2-4 | ||
| Microsoft | N/A | cbl2 msft-golang 1.24.8-1 | ||
| Microsoft | N/A | azl3 gh 2.62.0-9 | ||
| Microsoft | N/A | azl3 frr 9.1.1-3 | ||
| Microsoft | N/A | azl3 xorg-x11-server-Xwayland 24.1.6-2 versions antérieures à 24.1.6-3 | ||
| Microsoft | N/A | cbl2 libcontainers-common 20210626-7 | ||
| Microsoft | N/A | cbl2 moby-engine 24.0.9-18 | ||
| Microsoft | N/A | cbl2 frr 8.5.5-3 | ||
| Microsoft | N/A | azl3 containerized-data-importer 1.57.0-16 | ||
| Microsoft | N/A | azl3 skopeo 1.14.4-6 | ||
| Microsoft | N/A | azl3 tensorflow 2.16.1-9 | ||
| Microsoft | N/A | azl3 keras 3.3.3-4 versions antérieures à 3.3.3-5 | ||
| Microsoft | N/A | cbl2 gcc 11.2.0-8 | ||
| Microsoft | N/A | cbl2 keras 2.11.0-3 | ||
| Microsoft | N/A | azl3 golang 1.25.3-1 | ||
| Microsoft | N/A | cbl2 tensorflow 2.11.1-2 | ||
| Microsoft | N/A | azl3 keras 3.3.3-4 | ||
| Microsoft | N/A | azl3 gcc 13.2.0-7 | ||
| Microsoft | N/A | cbl2 cri-o 1.22.3-16 | ||
| Microsoft | N/A | cbl2 skopeo 1.14.2-12 | ||
| Microsoft | N/A | cbl2 containerized-data-importer 1.55.0-25 | ||
| Microsoft | N/A | cbl2 golang 1.18.8-10 | ||
| Microsoft | N/A | azl3 libcontainers-common 20240213-3 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "cbl2 golang 1.22.7-5",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 golang 1.23.12-1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 python-tensorboard 2.11.0-3",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 moby-engine 25.0.3-13",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 python-tensorboard 2.16.2-6",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 kernel 6.6.104.2-4",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 msft-golang 1.24.8-1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 gh 2.62.0-9",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 frr 9.1.1-3",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 xorg-x11-server-Xwayland 24.1.6-2 versions ant\u00e9rieures \u00e0 24.1.6-3",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 libcontainers-common 20210626-7",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 moby-engine 24.0.9-18",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 frr 8.5.5-3",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 containerized-data-importer 1.57.0-16",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 skopeo 1.14.4-6",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 tensorflow 2.16.1-9",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 keras 3.3.3-4 versions ant\u00e9rieures \u00e0 3.3.3-5",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 gcc 11.2.0-8",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 keras 2.11.0-3",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 golang 1.25.3-1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 tensorflow 2.11.1-2",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 keras 3.3.3-4",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 gcc 13.2.0-7",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 cri-o 1.22.3-16",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 skopeo 1.14.2-12",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 containerized-data-importer 1.55.0-25",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 golang 1.18.8-10",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 libcontainers-common 20240213-3",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-58183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58183"
},
{
"name": "CVE-2025-40100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40100"
},
{
"name": "CVE-2025-40103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40103"
},
{
"name": "CVE-2025-61102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61102"
},
{
"name": "CVE-2025-58185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58185"
},
{
"name": "CVE-2025-40092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40092"
},
{
"name": "CVE-2025-61106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61106"
},
{
"name": "CVE-2025-61103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61103"
},
{
"name": "CVE-2025-62230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62230"
},
{
"name": "CVE-2025-40104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40104"
},
{
"name": "CVE-2025-40097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40097"
},
{
"name": "CVE-2025-40106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40106"
},
{
"name": "CVE-2025-58188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58188"
},
{
"name": "CVE-2025-40088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40088"
},
{
"name": "CVE-2025-40085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40085"
},
{
"name": "CVE-2025-61724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61724"
},
{
"name": "CVE-2025-61105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61105"
},
{
"name": "CVE-2025-61723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61723"
},
{
"name": "CVE-2025-40084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40084"
},
{
"name": "CVE-2025-61725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61725"
},
{
"name": "CVE-2025-47912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47912"
},
{
"name": "CVE-2025-40095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40095"
},
{
"name": "CVE-2025-58186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58186"
},
{
"name": "CVE-2025-40105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40105"
},
{
"name": "CVE-2025-62229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62229"
},
{
"name": "CVE-2025-58187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58187"
},
{
"name": "CVE-2025-40083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40083"
},
{
"name": "CVE-2025-62231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62231"
},
{
"name": "CVE-2025-40099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40099"
},
{
"name": "CVE-2025-12060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12060"
},
{
"name": "CVE-2025-58189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58189"
},
{
"name": "CVE-2025-40094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40094"
},
{
"name": "CVE-2025-40102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40102"
},
{
"name": "CVE-2025-12058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12058"
},
{
"name": "CVE-2025-61101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61101"
},
{
"name": "CVE-2025-61107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61107"
},
{
"name": "CVE-2025-61100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61100"
},
{
"name": "CVE-2025-40096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40096"
},
{
"name": "CVE-2025-61104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61104"
},
{
"name": "CVE-2025-40087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40087"
}
],
"initial_release_date": "2025-11-05T00:00:00",
"last_revision_date": "2025-11-05T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0966",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-11-05T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Microsoft. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Microsoft",
"vendor_advisories": [
{
"published_at": "2025-10-31",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-58189",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58189"
},
{
"published_at": "2025-10-31",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40099",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40099"
},
{
"published_at": "2025-10-31",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40083",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40083"
},
{
"published_at": "2025-10-31",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-58186",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58186"
},
{
"published_at": "2025-10-31",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-61724",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61724"
},
{
"published_at": "2025-10-31",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-61103",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61103"
},
{
"published_at": "2025-10-31",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-12058",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-12058"
},
{
"published_at": "2025-10-31",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40087",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40087"
},
{
"published_at": "2025-11-02",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-61100",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61100"
},
{
"published_at": "2025-10-31",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-61105",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61105"
},
{
"published_at": "2025-10-31",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-62229",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62229"
},
{
"published_at": "2025-11-01",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40106",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40106"
},
{
"published_at": "2025-10-31",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-62231",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62231"
},
{
"published_at": "2025-10-31",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-61102",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61102"
},
{
"published_at": "2025-10-31",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40097",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40097"
},
{
"published_at": "2025-10-31",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40100",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40100"
},
{
"published_at": "2025-10-31",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40084",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40084"
},
{
"published_at": "2025-10-31",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-58187",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58187"
},
{
"published_at": "2025-10-31",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40094",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40094"
},
{
"published_at": "2025-10-31",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-61106",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61106"
},
{
"published_at": "2025-10-31",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40104",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40104"
},
{
"published_at": "2025-10-31",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40103",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40103"
},
{
"published_at": "2025-11-02",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-61104",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61104"
},
{
"published_at": "2025-10-31",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40085",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40085"
},
{
"published_at": "2025-10-31",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-47912",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47912"
},
{
"published_at": "2025-10-31",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40092",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40092"
},
{
"published_at": "2025-10-31",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40105",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40105"
},
{
"published_at": "2025-10-31",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40096",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40096"
},
{
"published_at": "2025-10-31",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-61107",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61107"
},
{
"published_at": "2025-10-31",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40088",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40088"
},
{
"published_at": "2025-10-31",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-58183",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58183"
},
{
"published_at": "2025-10-31",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-61725",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61725"
},
{
"published_at": "2025-11-02",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-61101",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61101"
},
{
"published_at": "2025-10-31",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-61723",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61723"
},
{
"published_at": "2025-10-31",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40102",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40102"
},
{
"published_at": "2025-10-31",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40095",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40095"
},
{
"published_at": "2025-11-01",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-12060",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-12060"
},
{
"published_at": "2025-11-02",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-62230",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62230"
},
{
"published_at": "2025-10-31",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-58185",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58185"
},
{
"published_at": "2025-10-31",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-58188",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58188"
}
]
}
CERTFR-2025-AVI-1048
Vulnerability from certfr_avis - Published: 2025-11-28 - Updated: 2025-11-28
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Debian LTS. Certaines d'entre elles permettent à un attaquant de provoquer une élévation de privilèges, une atteinte à la confidentialité des données et une atteinte à l'intégrité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Debian LTS bullseye versions ant\u00e9rieures \u00e0 6.1.158-1~deb11u1",
"product": {
"name": "Debian",
"vendor": {
"name": "Debian",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-39987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39987"
},
{
"name": "CVE-2025-21861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21861"
},
{
"name": "CVE-2025-40156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40156"
},
{
"name": "CVE-2025-40055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40055"
},
{
"name": "CVE-2025-40029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40029"
},
{
"name": "CVE-2025-40008",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40008"
},
{
"name": "CVE-2025-40048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40048"
},
{
"name": "CVE-2025-40043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40043"
},
{
"name": "CVE-2025-39973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39973"
},
{
"name": "CVE-2025-39943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39943"
},
{
"name": "CVE-2025-39945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39945"
},
{
"name": "CVE-2025-40100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40100"
},
{
"name": "CVE-2025-40019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40019"
},
{
"name": "CVE-2025-40081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40081"
},
{
"name": "CVE-2025-40026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40026"
},
{
"name": "CVE-2025-40153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40153"
},
{
"name": "CVE-2025-40103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40103"
},
{
"name": "CVE-2025-40121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40121"
},
{
"name": "CVE-2025-40204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40204"
},
{
"name": "CVE-2025-40171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40171"
},
{
"name": "CVE-2025-40056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40056"
},
{
"name": "CVE-2025-40125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40125"
},
{
"name": "CVE-2025-40187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40187"
},
{
"name": "CVE-2025-40092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40092"
},
{
"name": "CVE-2025-39967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39967"
},
{
"name": "CVE-2025-40107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40107"
},
{
"name": "CVE-2025-40115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40115"
},
{
"name": "CVE-2025-40198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40198"
},
{
"name": "CVE-2025-39942",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39942"
},
{
"name": "CVE-2025-39929",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39929"
},
{
"name": "CVE-2025-39949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39949"
},
{
"name": "CVE-2025-40173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40173"
},
{
"name": "CVE-2025-40190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40190"
},
{
"name": "CVE-2025-40010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40010"
},
{
"name": "CVE-2025-39944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39944"
},
{
"name": "CVE-2025-40202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40202"
},
{
"name": "CVE-2025-39953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39953"
},
{
"name": "CVE-2025-40167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40167"
},
{
"name": "CVE-2025-39969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39969"
},
{
"name": "CVE-2025-40194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40194"
},
{
"name": "CVE-2025-40104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40104"
},
{
"name": "CVE-2025-40001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40001"
},
{
"name": "CVE-2025-40035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40035"
},
{
"name": "CVE-2025-39988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39988"
},
{
"name": "CVE-2025-40020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40020"
},
{
"name": "CVE-2025-40188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40188"
},
{
"name": "CVE-2025-40186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40186"
},
{
"name": "CVE-2025-40013",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40013"
},
{
"name": "CVE-2025-40049",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40049"
},
{
"name": "CVE-2025-40070",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40070"
},
{
"name": "CVE-2025-40106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40106"
},
{
"name": "CVE-2025-40205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40205"
},
{
"name": "CVE-2025-39977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39977"
},
{
"name": "CVE-2025-40027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40027"
},
{
"name": "CVE-2025-39970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39970"
},
{
"name": "CVE-2025-40032",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40032"
},
{
"name": "CVE-2025-39994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39994"
},
{
"name": "CVE-2025-40088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40088"
},
{
"name": "CVE-2025-40062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40062"
},
{
"name": "CVE-2025-40197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40197"
},
{
"name": "CVE-2025-40109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40109"
},
{
"name": "CVE-2025-40006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40006"
},
{
"name": "CVE-2025-40011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40011"
},
{
"name": "CVE-2025-40085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40085"
},
{
"name": "CVE-2025-40176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40176"
},
{
"name": "CVE-2025-40193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40193"
},
{
"name": "CVE-2025-40201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40201"
},
{
"name": "CVE-2025-40084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40084"
},
{
"name": "CVE-2025-40183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40183"
},
{
"name": "CVE-2025-39998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39998"
},
{
"name": "CVE-2025-40134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40134"
},
{
"name": "CVE-2025-39968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39968"
},
{
"name": "CVE-2025-39986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39986"
},
{
"name": "CVE-2025-39955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39955"
},
{
"name": "CVE-2025-40078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40078"
},
{
"name": "CVE-2025-40116",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40116"
},
{
"name": "CVE-2025-39934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39934"
},
{
"name": "CVE-2025-39978",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39978"
},
{
"name": "CVE-2025-40179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40179"
},
{
"name": "CVE-2025-40127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40127"
},
{
"name": "CVE-2025-39996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39996"
},
{
"name": "CVE-2025-40053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40053"
},
{
"name": "CVE-2025-39951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39951"
},
{
"name": "CVE-2025-40120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40120"
},
{
"name": "CVE-2025-39938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39938"
},
{
"name": "CVE-2025-39982",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39982"
},
{
"name": "CVE-2025-40040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40040"
},
{
"name": "CVE-2025-40207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40207"
},
{
"name": "CVE-2025-40095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40095"
},
{
"name": "CVE-2025-40118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40118"
},
{
"name": "CVE-2025-40021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40021"
},
{
"name": "CVE-2025-39964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39964"
},
{
"name": "CVE-2025-39993",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39993"
},
{
"name": "CVE-2025-40044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40044"
},
{
"name": "CVE-2025-40105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40105"
},
{
"name": "CVE-2025-40112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40112"
},
{
"name": "CVE-2025-39971",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39971"
},
{
"name": "CVE-2025-40154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40154"
},
{
"name": "CVE-2025-40093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40093"
},
{
"name": "CVE-2025-40099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40099"
},
{
"name": "CVE-2025-40126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40126"
},
{
"name": "CVE-2025-39972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39972"
},
{
"name": "CVE-2025-40018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40018"
},
{
"name": "CVE-2025-40200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40200"
},
{
"name": "CVE-2025-40124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40124"
},
{
"name": "CVE-2025-40094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40094"
},
{
"name": "CVE-2025-40080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40080"
},
{
"name": "CVE-2025-40111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40111"
},
{
"name": "CVE-2025-40068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40068"
},
{
"name": "CVE-2025-40042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40042"
},
{
"name": "CVE-2025-39957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39957"
},
{
"name": "CVE-2025-39931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39931"
},
{
"name": "CVE-2025-39937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39937"
},
{
"name": "CVE-2025-40060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40060"
},
{
"name": "CVE-2025-40123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40123"
},
{
"name": "CVE-2025-40178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40178"
},
{
"name": "CVE-2025-39985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39985"
},
{
"name": "CVE-2025-40141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40141"
},
{
"name": "CVE-2025-39946",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39946"
},
{
"name": "CVE-2025-39980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39980"
},
{
"name": "CVE-2025-40036",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40036"
},
{
"name": "CVE-2025-40030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40030"
},
{
"name": "CVE-2025-39995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39995"
},
{
"name": "CVE-2025-40096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40096"
},
{
"name": "CVE-2025-40022",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40022"
},
{
"name": "CVE-2025-40140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40140"
},
{
"name": "CVE-2025-40051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40051"
},
{
"name": "CVE-2025-40087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40087"
}
],
"initial_release_date": "2025-11-28T00:00:00",
"last_revision_date": "2025-11-28T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-1048",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-11-28T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de Debian LTS. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Debian LTS",
"vendor_advisories": [
{
"published_at": "2025-11-25",
"title": "Bulletin de s\u00e9curit\u00e9 Debian LTS DLA-4379-1",
"url": "https://lists.debian.org/debian-lts-announce/2025/11/msg00022.html"
}
]
}
CERTFR-2026-AVI-0329
Vulnerability from certfr_avis - Published: 2026-03-20 - Updated: 2026-03-20
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, un déni de service et un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Micro Extras 6.0",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Micro 6.1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro for Rancher 5.2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Micro 6.0",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Micro Extras 6.1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2026-23198",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23198"
},
{
"name": "CVE-2026-23202",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23202"
},
{
"name": "CVE-2026-23167",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23167"
},
{
"name": "CVE-2025-68374",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68374"
},
{
"name": "CVE-2026-23129",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23129"
},
{
"name": "CVE-2025-68778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68778"
},
{
"name": "CVE-2025-68736",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68736"
},
{
"name": "CVE-2025-68283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68283"
},
{
"name": "CVE-2026-23004",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23004"
},
{
"name": "CVE-2025-71071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71071"
},
{
"name": "CVE-2025-71191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71191"
},
{
"name": "CVE-2025-68295",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68295"
},
{
"name": "CVE-2025-40103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40103"
},
{
"name": "CVE-2025-21738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21738"
},
{
"name": "CVE-2026-23139",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23139"
},
{
"name": "CVE-2026-23208",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23208"
},
{
"name": "CVE-2026-23017",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23017"
},
{
"name": "CVE-2025-71189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71189"
},
{
"name": "CVE-2026-23179",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23179"
},
{
"name": "CVE-2026-23090",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23090"
},
{
"name": "CVE-2026-23035",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23035"
},
{
"name": "CVE-2025-38375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38375"
},
{
"name": "CVE-2026-23064",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23064"
},
{
"name": "CVE-2026-23061",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23061"
},
{
"name": "CVE-2026-23135",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23135"
},
{
"name": "CVE-2026-23119",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23119"
},
{
"name": "CVE-2026-23173",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23173"
},
{
"name": "CVE-2026-23222",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23222"
},
{
"name": "CVE-2026-23094",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23094"
},
{
"name": "CVE-2026-23049",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23049"
},
{
"name": "CVE-2026-23229",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23229"
},
{
"name": "CVE-2026-23101",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23101"
},
{
"name": "CVE-2026-23099",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23099"
},
{
"name": "CVE-2026-23085",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23085"
},
{
"name": "CVE-2026-23209",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23209"
},
{
"name": "CVE-2026-23150",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23150"
},
{
"name": "CVE-2026-23163",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23163"
},
{
"name": "CVE-2025-71235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71235"
},
{
"name": "CVE-2026-23057",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23057"
},
{
"name": "CVE-2026-23166",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23166"
},
{
"name": "CVE-2026-23116",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23116"
},
{
"name": "CVE-2026-23207",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23207"
},
{
"name": "CVE-2025-71200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71200"
},
{
"name": "CVE-2026-23172",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23172"
},
{
"name": "CVE-2026-23133",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23133"
},
{
"name": "CVE-2026-23170",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23170"
},
{
"name": "CVE-2026-23204",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23204"
},
{
"name": "CVE-2025-71188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71188"
},
{
"name": "CVE-2026-23214",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23214"
},
{
"name": "CVE-2025-37861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37861"
},
{
"name": "CVE-2026-23178",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23178"
},
{
"name": "CVE-2025-71196",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71196"
},
{
"name": "CVE-2026-23191",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23191"
},
{
"name": "CVE-2026-23078",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23078"
},
{
"name": "CVE-2025-68785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68785"
},
{
"name": "CVE-2025-38224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38224"
},
{
"name": "CVE-2026-23074",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23074"
},
{
"name": "CVE-2025-71126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71126"
},
{
"name": "CVE-2025-71199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71199"
},
{
"name": "CVE-2025-71195",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71195"
},
{
"name": "CVE-2026-23083",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23083"
},
{
"name": "CVE-2026-23108",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23108"
},
{
"name": "CVE-2025-71194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71194"
},
{
"name": "CVE-2026-23068",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23068"
},
{
"name": "CVE-2026-23089",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23089"
},
{
"name": "CVE-2025-71225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71225"
},
{
"name": "CVE-2026-23071",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23071"
},
{
"name": "CVE-2026-23056",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23056"
},
{
"name": "CVE-2026-23063",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23063"
},
{
"name": "CVE-2026-23073",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23073"
},
{
"name": "CVE-2026-23058",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23058"
},
{
"name": "CVE-2025-71182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71182"
},
{
"name": "CVE-2026-23176",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23176"
},
{
"name": "CVE-2026-23026",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23026"
},
{
"name": "CVE-2025-71190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71190"
},
{
"name": "CVE-2026-23107",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23107"
},
{
"name": "CVE-2025-71104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71104"
},
{
"name": "CVE-2026-23146",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23146"
},
{
"name": "CVE-2025-38129",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38129"
},
{
"name": "CVE-2026-23037",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23037"
},
{
"name": "CVE-2025-71224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71224"
},
{
"name": "CVE-2026-23221",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23221"
},
{
"name": "CVE-2026-23151",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23151"
},
{
"name": "CVE-2026-23152",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23152"
},
{
"name": "CVE-2026-22982",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22982"
},
{
"name": "CVE-2025-71222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71222"
},
{
"name": "CVE-2025-71229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71229"
},
{
"name": "CVE-2026-23213",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23213"
},
{
"name": "CVE-2026-23091",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23091"
},
{
"name": "CVE-2023-53817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53817"
},
{
"name": "CVE-2025-71192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71192"
},
{
"name": "CVE-2026-23121",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23121"
},
{
"name": "CVE-2025-39964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39964"
},
{
"name": "CVE-2025-71066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71066"
},
{
"name": "CVE-2025-71236",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71236"
},
{
"name": "CVE-2025-71234",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71234"
},
{
"name": "CVE-2025-71185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71185"
},
{
"name": "CVE-2026-23096",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23096"
},
{
"name": "CVE-2025-71232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71232"
},
{
"name": "CVE-2025-40099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40099"
},
{
"name": "CVE-2026-23105",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23105"
},
{
"name": "CVE-2026-23141",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23141"
},
{
"name": "CVE-2026-23182",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23182"
},
{
"name": "CVE-2026-23086",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23086"
},
{
"name": "CVE-2025-71148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71148"
},
{
"name": "CVE-2026-23156",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23156"
},
{
"name": "CVE-2026-23095",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23095"
},
{
"name": "CVE-2025-39748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39748"
},
{
"name": "CVE-2023-53827",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53827"
},
{
"name": "CVE-2026-23033",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23033"
},
{
"name": "CVE-2026-23145",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23145"
},
{
"name": "CVE-2026-23104",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23104"
},
{
"name": "CVE-2026-23003",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23003"
},
{
"name": "CVE-2026-23076",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23076"
},
{
"name": "CVE-2026-23171",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23171"
},
{
"name": "CVE-2026-23112",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23112"
},
{
"name": "CVE-2026-23084",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23084"
},
{
"name": "CVE-2026-23190",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23190"
},
{
"name": "CVE-2026-22979",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22979"
},
{
"name": "CVE-2026-23110",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23110"
},
{
"name": "CVE-2026-23060",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23060"
},
{
"name": "CVE-2025-71197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71197"
},
{
"name": "CVE-2025-71113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71113"
},
{
"name": "CVE-2026-23102",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23102"
},
{
"name": "CVE-2026-22998",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22998"
},
{
"name": "CVE-2026-23082",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23082"
},
{
"name": "CVE-2026-23155",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23155"
},
{
"name": "CVE-2026-23111",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23111"
},
{
"name": "CVE-2026-23113",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23113"
},
{
"name": "CVE-2025-71231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71231"
},
{
"name": "CVE-2023-53794",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53794"
},
{
"name": "CVE-2025-68810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68810"
},
{
"name": "CVE-2025-71198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71198"
},
{
"name": "CVE-2026-23021",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23021"
},
{
"name": "CVE-2025-68285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68285"
},
{
"name": "CVE-2026-23053",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23053"
},
{
"name": "CVE-2025-71184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71184"
},
{
"name": "CVE-2026-23080",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23080"
}
],
"initial_release_date": "2026-03-20T00:00:00",
"last_revision_date": "2026-03-20T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0329",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-03-20T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de SUSE. Elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es, un d\u00e9ni de service et un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": "2026-03-05",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20674-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620674-1"
},
{
"published_at": "2026-03-05",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20672-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620672-1"
},
{
"published_at": "2026-03-05",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20680-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620680-1"
},
{
"published_at": "2026-03-05",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20699-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620699-1"
},
{
"published_at": "2026-03-05",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20678-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620678-1"
},
{
"published_at": "2026-03-05",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20679-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620679-1"
},
{
"published_at": "2026-03-05",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20702-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620702-1"
},
{
"published_at": "2026-03-05",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20704-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620704-1"
},
{
"published_at": "2026-03-05",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20681-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620681-1"
},
{
"published_at": "2026-03-05",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20700-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620700-1"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0928-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260928-1"
},
{
"published_at": "2026-03-11",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20719-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620719-1"
},
{
"published_at": "2026-03-11",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20711-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620711-1"
},
{
"published_at": "2026-03-11",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20720-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620720-1"
},
{
"published_at": "2026-03-05",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20701-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620701-1"
},
{
"published_at": "2026-03-11",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20713-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620713-1"
},
{
"published_at": "2026-03-05",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20703-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620703-1"
},
{
"published_at": "2026-03-05",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20705-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620705-1"
},
{
"published_at": "2026-03-11",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20667-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620667-1"
},
{
"published_at": "2026-03-05",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20673-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620673-1"
},
{
"published_at": "2026-03-11",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20676-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620676-1"
}
]
}
CERTFR-2026-AVI-0169
Vulnerability from certfr_avis - Published: 2026-02-13 - Updated: 2026-02-13
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Certaines d'entre elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, une atteinte à l'intégrité des données et un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 16.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 20.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 24.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 18.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 25.10",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 22.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-40296",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40296"
},
{
"name": "CVE-2025-40225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40225"
},
{
"name": "CVE-2025-40166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40166"
},
{
"name": "CVE-2025-40273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40273"
},
{
"name": "CVE-2025-40064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40064"
},
{
"name": "CVE-2025-38490",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38490"
},
{
"name": "CVE-2025-37850",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37850"
},
{
"name": "CVE-2025-38485",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38485"
},
{
"name": "CVE-2025-22026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22026"
},
{
"name": "CVE-2025-39987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39987"
},
{
"name": "CVE-2025-38579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38579"
},
{
"name": "CVE-2025-68196",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68196"
},
{
"name": "CVE-2025-37761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37761"
},
{
"name": "CVE-2025-21861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21861"
},
{
"name": "CVE-2025-37865",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37865"
},
{
"name": "CVE-2025-38328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38328"
},
{
"name": "CVE-2025-40156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40156"
},
{
"name": "CVE-2025-38711",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38711"
},
{
"name": "CVE-2025-38487",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38487"
},
{
"name": "CVE-2025-40137",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40137"
},
{
"name": "CVE-2025-37775",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37775"
},
{
"name": "CVE-2025-38335",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38335"
},
{
"name": "CVE-2025-38304",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38304"
},
{
"name": "CVE-2025-37892",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37892"
},
{
"name": "CVE-2025-38100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38100"
},
{
"name": "CVE-2025-37859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37859"
},
{
"name": "CVE-2025-40002",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40002"
},
{
"name": "CVE-2025-40057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40057"
},
{
"name": "CVE-2025-38043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38043"
},
{
"name": "CVE-2025-38471",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38471"
},
{
"name": "CVE-2025-38520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38520"
},
{
"name": "CVE-2025-37792",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37792"
},
{
"name": "CVE-2025-68240",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68240"
},
{
"name": "CVE-2025-38108",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38108"
},
{
"name": "CVE-2025-38230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38230"
},
{
"name": "CVE-2025-38229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38229"
},
{
"name": "CVE-2025-40055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40055"
},
{
"name": "CVE-2025-38158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38158"
},
{
"name": "CVE-2025-37872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37872"
},
{
"name": "CVE-2025-38588",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38588"
},
{
"name": "CVE-2025-39876",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39876"
},
{
"name": "CVE-2025-40314",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40314"
},
{
"name": "CVE-2025-40029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40029"
},
{
"name": "CVE-2025-40037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40037"
},
{
"name": "CVE-2025-38279",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38279"
},
{
"name": "CVE-2025-38561",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38561"
},
{
"name": "CVE-2025-38574",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38574"
},
{
"name": "CVE-2025-40306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40306"
},
{
"name": "CVE-2025-68210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68210"
},
{
"name": "CVE-2025-40239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40239"
},
{
"name": "CVE-2025-40147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40147"
},
{
"name": "CVE-2025-40048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40048"
},
{
"name": "CVE-2025-38147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38147"
},
{
"name": "CVE-2025-23155",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23155"
},
{
"name": "CVE-2025-38286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38286"
},
{
"name": "CVE-2025-40219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40219"
},
{
"name": "CVE-2025-39757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39757"
},
{
"name": "CVE-2025-68200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68200"
},
{
"name": "CVE-2025-38501",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38501"
},
{
"name": "CVE-2025-38474",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38474"
},
{
"name": "CVE-2025-37979",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37979"
},
{
"name": "CVE-2025-40043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40043"
},
{
"name": "CVE-2024-50195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50195"
},
{
"name": "CVE-2025-68176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68176"
},
{
"name": "CVE-2025-37777",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37777"
},
{
"name": "CVE-2025-39772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39772"
},
{
"name": "CVE-2025-68199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68199"
},
{
"name": "CVE-2025-37936",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37936"
},
{
"name": "CVE-2025-68204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68204"
},
{
"name": "CVE-2025-38601",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38601"
},
{
"name": "CVE-2025-37766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37766"
},
{
"name": "CVE-2025-38104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38104"
},
{
"name": "CVE-2025-37844",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37844"
},
{
"name": "CVE-2025-21931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21931"
},
{
"name": "CVE-2025-37871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37871"
},
{
"name": "CVE-2025-37778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37778"
},
{
"name": "CVE-2025-39716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39716"
},
{
"name": "CVE-2025-39702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39702"
},
{
"name": "CVE-2024-56606",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56606"
},
{
"name": "CVE-2025-39973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39973"
},
{
"name": "CVE-2025-38515",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38515"
},
{
"name": "CVE-2025-38645",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38645"
},
{
"name": "CVE-2025-38163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38163"
},
{
"name": "CVE-2025-22126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22126"
},
{
"name": "CVE-2025-38444",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38444"
},
{
"name": "CVE-2025-38109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38109"
},
{
"name": "CVE-2025-39779",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39779"
},
{
"name": "CVE-2025-37755",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37755"
},
{
"name": "CVE-2025-39685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39685"
},
{
"name": "CVE-2025-38660",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38660"
},
{
"name": "CVE-2025-39761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39761"
},
{
"name": "CVE-2025-68246",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68246"
},
{
"name": "CVE-2022-48986",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48986"
},
{
"name": "CVE-2025-40287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40287"
},
{
"name": "CVE-2025-39943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39943"
},
{
"name": "CVE-2025-39945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39945"
},
{
"name": "CVE-2024-27078",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27078"
},
{
"name": "CVE-2024-56756",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56756"
},
{
"name": "CVE-2025-39883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39883"
},
{
"name": "CVE-2025-39720",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39720"
},
{
"name": "CVE-2025-38624",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38624"
},
{
"name": "CVE-2025-40100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40100"
},
{
"name": "CVE-2025-40285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40285"
},
{
"name": "CVE-2025-38388",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38388"
},
{
"name": "CVE-2025-38157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38157"
},
{
"name": "CVE-2025-40063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40063"
},
{
"name": "CVE-2025-37790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37790"
},
{
"name": "CVE-2025-40208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40208"
},
{
"name": "CVE-2025-39746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39746"
},
{
"name": "CVE-2025-38323",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38323"
},
{
"name": "CVE-2025-40019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40019"
},
{
"name": "CVE-2025-40039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40039"
},
{
"name": "CVE-2025-38208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38208"
},
{
"name": "CVE-2025-40240",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40240"
},
{
"name": "CVE-2025-38219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38219"
},
{
"name": "CVE-2025-39889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39889"
},
{
"name": "CVE-2025-38099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38099"
},
{
"name": "CVE-2025-38524",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38524"
},
{
"name": "CVE-2025-38466",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38466"
},
{
"name": "CVE-2025-40117",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40117"
},
{
"name": "CVE-2025-37758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37758"
},
{
"name": "CVE-2025-40081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40081"
},
{
"name": "CVE-2025-38087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38087"
},
{
"name": "CVE-2024-58011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58011"
},
{
"name": "CVE-2025-38039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38039"
},
{
"name": "CVE-2025-40026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40026"
},
{
"name": "CVE-2025-40153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40153"
},
{
"name": "CVE-2025-40103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40103"
},
{
"name": "CVE-2025-40294",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40294"
},
{
"name": "CVE-2025-38595",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38595"
},
{
"name": "CVE-2025-38626",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38626"
},
{
"name": "CVE-2025-40356",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40356"
},
{
"name": "CVE-2025-40121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40121"
},
{
"name": "CVE-2025-40312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40312"
},
{
"name": "CVE-2025-40204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40204"
},
{
"name": "CVE-2025-37852",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37852"
},
{
"name": "CVE-2025-37841",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37841"
},
{
"name": "CVE-2025-40171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40171"
},
{
"name": "CVE-2025-37918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37918"
},
{
"name": "CVE-2025-37917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37917"
},
{
"name": "CVE-2025-38290",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38290"
},
{
"name": "CVE-2025-68243",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68243"
},
{
"name": "CVE-2025-38063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38063"
},
{
"name": "CVE-2025-37770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37770"
},
{
"name": "CVE-2025-37773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37773"
},
{
"name": "CVE-2025-68175",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68175"
},
{
"name": "CVE-2025-40221",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40221"
},
{
"name": "CVE-2025-38578",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38578"
},
{
"name": "CVE-2025-40139",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40139"
},
{
"name": "CVE-2025-40056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40056"
},
{
"name": "CVE-2025-38675",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38675"
},
{
"name": "CVE-2025-39911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39911"
},
{
"name": "CVE-2025-38646",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38646"
},
{
"name": "CVE-2025-38491",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38491"
},
{
"name": "CVE-2025-38708",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38708"
},
{
"name": "CVE-2025-37961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37961"
},
{
"name": "CVE-2025-68248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68248"
},
{
"name": "CVE-2025-40125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40125"
},
{
"name": "CVE-2025-40350",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40350"
},
{
"name": "CVE-2025-40309",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40309"
},
{
"name": "CVE-2025-38313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38313"
},
{
"name": "CVE-2025-38336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38336"
},
{
"name": "CVE-2025-40349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40349"
},
{
"name": "CVE-2025-40052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40052"
},
{
"name": "CVE-2025-38408",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38408"
},
{
"name": "CVE-2025-40343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40343"
},
{
"name": "CVE-2025-38644",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38644"
},
{
"name": "CVE-2025-38692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38692"
},
{
"name": "CVE-2025-38061",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38061"
},
{
"name": "CVE-2025-68173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68173"
},
{
"name": "CVE-2025-37983",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37983"
},
{
"name": "CVE-2025-38127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38127"
},
{
"name": "CVE-2025-38375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38375"
},
{
"name": "CVE-2025-37784",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37784"
},
{
"name": "CVE-2025-39701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39701"
},
{
"name": "CVE-2025-40308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40308"
},
{
"name": "CVE-2025-40187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40187"
},
{
"name": "CVE-2025-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37920"
},
{
"name": "CVE-2025-40315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40315"
},
{
"name": "CVE-2025-37815",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37815"
},
{
"name": "CVE-2025-38686",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38686"
},
{
"name": "CVE-2025-37819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37819"
},
{
"name": "CVE-2025-39913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39913"
},
{
"name": "CVE-2025-40092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40092"
},
{
"name": "CVE-2025-40298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40298"
},
{
"name": "CVE-2025-40355",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40355"
},
{
"name": "CVE-2025-38609",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38609"
},
{
"name": "CVE-2025-68186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68186"
},
{
"name": "CVE-2025-39967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39967"
},
{
"name": "CVE-2025-40054",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40054"
},
{
"name": "CVE-2025-68184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68184"
},
{
"name": "CVE-2024-36357",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36357"
},
{
"name": "CVE-2025-38463",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38463"
},
{
"name": "CVE-2025-40115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40115"
},
{
"name": "CVE-2025-38112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38112"
},
{
"name": "CVE-2024-49959",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49959"
},
{
"name": "CVE-2025-38521",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38521"
},
{
"name": "CVE-2025-38023",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38023"
},
{
"name": "CVE-2025-39709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39709"
},
{
"name": "CVE-2025-38282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38282"
},
{
"name": "CVE-2025-39689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39689"
},
{
"name": "CVE-2025-38215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38215"
},
{
"name": "CVE-2025-39787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39787"
},
{
"name": "CVE-2025-37943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37943"
},
{
"name": "CVE-2025-37745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37745"
},
{
"name": "CVE-2025-40058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40058"
},
{
"name": "CVE-2025-39731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39731"
},
{
"name": "CVE-2025-38734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38734"
},
{
"name": "CVE-2025-38653",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38653"
},
{
"name": "CVE-2025-38571",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38571"
},
{
"name": "CVE-2025-37789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37789"
},
{
"name": "CVE-2025-40347",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40347"
},
{
"name": "CVE-2025-38695",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38695"
},
{
"name": "CVE-2025-38004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38004"
},
{
"name": "CVE-2025-39749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39749"
},
{
"name": "CVE-2025-40198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40198"
},
{
"name": "CVE-2025-68310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68310"
},
{
"name": "CVE-2025-68179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68179"
},
{
"name": "CVE-2025-40145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40145"
},
{
"name": "CVE-2025-39949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39949"
},
{
"name": "CVE-2025-38387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38387"
},
{
"name": "CVE-2025-68169",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68169"
},
{
"name": "CVE-2025-38362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38362"
},
{
"name": "CVE-2025-40173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40173"
},
{
"name": "CVE-2025-68316",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68316"
},
{
"name": "CVE-2025-68321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68321"
},
{
"name": "CVE-2025-37924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37924"
},
{
"name": "CVE-2025-40004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40004"
},
{
"name": "CVE-2025-38371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38371"
},
{
"name": "CVE-2024-56538",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56538"
},
{
"name": "CVE-2025-39923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39923"
},
{
"name": "CVE-2025-38445",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38445"
},
{
"name": "CVE-2025-38456",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38456"
},
{
"name": "CVE-2025-38538",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38538"
},
{
"name": "CVE-2025-37867",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37867"
},
{
"name": "CVE-2025-23160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23160"
},
{
"name": "CVE-2025-40311",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40311"
},
{
"name": "CVE-2025-38295",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38295"
},
{
"name": "CVE-2025-38461",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38461"
},
{
"name": "CVE-2025-37857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37857"
},
{
"name": "CVE-2025-37842",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37842"
},
{
"name": "CVE-2025-40237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40237"
},
{
"name": "CVE-2025-39953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39953"
},
{
"name": "CVE-2025-38710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38710"
},
{
"name": "CVE-2025-39681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39681"
},
{
"name": "CVE-2025-38060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38060"
},
{
"name": "CVE-2025-40167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40167"
},
{
"name": "CVE-2025-38159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38159"
},
{
"name": "CVE-2025-38066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38066"
},
{
"name": "CVE-2025-39770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39770"
},
{
"name": "CVE-2025-39969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39969"
},
{
"name": "CVE-2025-37744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37744"
},
{
"name": "CVE-2025-38705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38705"
},
{
"name": "CVE-2025-40194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40194"
},
{
"name": "CVE-2025-38706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38706"
},
{
"name": "CVE-2025-40333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40333"
},
{
"name": "CVE-2025-38305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38305"
},
{
"name": "CVE-2025-37884",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37884"
},
{
"name": "CVE-2025-38067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38067"
},
{
"name": "CVE-2025-39750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39750"
},
{
"name": "CVE-2025-38699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38699"
},
{
"name": "CVE-2025-37927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37927"
},
{
"name": "CVE-2025-38707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38707"
},
{
"name": "CVE-2025-38562",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38562"
},
{
"name": "CVE-2025-37897",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37897"
},
{
"name": "CVE-2025-40256",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40256"
},
{
"name": "CVE-2025-37911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37911"
},
{
"name": "CVE-2025-40245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40245"
},
{
"name": "CVE-2025-38587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38587"
},
{
"name": "CVE-2025-37869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37869"
},
{
"name": "CVE-2025-39692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39692"
},
{
"name": "CVE-2025-40360",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40360"
},
{
"name": "CVE-2025-40332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40332"
},
{
"name": "CVE-2025-40082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40082"
},
{
"name": "CVE-2025-38068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38068"
},
{
"name": "CVE-2025-38436",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38436"
},
{
"name": "CVE-2025-37930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37930"
},
{
"name": "CVE-2025-40104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40104"
},
{
"name": "CVE-2025-38401",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38401"
},
{
"name": "CVE-2025-38677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38677"
},
{
"name": "CVE-2025-38097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38097"
},
{
"name": "CVE-2025-37810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37810"
},
{
"name": "CVE-2025-38253",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38253"
},
{
"name": "CVE-2025-40097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40097"
},
{
"name": "CVE-2025-38123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38123"
},
{
"name": "CVE-2025-38338",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38338"
},
{
"name": "CVE-2025-38555",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38555"
},
{
"name": "CVE-2025-38239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38239"
},
{
"name": "CVE-2025-40001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40001"
},
{
"name": "CVE-2025-38590",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38590"
},
{
"name": "CVE-2025-38027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38027"
},
{
"name": "CVE-2025-38102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38102"
},
{
"name": "CVE-2025-40035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40035"
},
{
"name": "CVE-2025-68187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68187"
},
{
"name": "CVE-2025-38283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38283"
},
{
"name": "CVE-2025-40322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40322"
},
{
"name": "CVE-2025-68209",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68209"
},
{
"name": "CVE-2025-40045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40045"
},
{
"name": "CVE-2025-23159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23159"
},
{
"name": "CVE-2025-39988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39988"
},
{
"name": "CVE-2025-38455",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38455"
},
{
"name": "CVE-2025-40313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40313"
},
{
"name": "CVE-2025-40089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40089"
},
{
"name": "CVE-2025-38584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38584"
},
{
"name": "CVE-2025-38015",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38015"
},
{
"name": "CVE-2025-39675",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39675"
},
{
"name": "CVE-2025-39679",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39679"
},
{
"name": "CVE-2025-38527",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38527"
},
{
"name": "CVE-2025-38449",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38449"
},
{
"name": "CVE-2025-40233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40233"
},
{
"name": "CVE-2025-40172",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40172"
},
{
"name": "CVE-2025-37853",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37853"
},
{
"name": "CVE-2025-38126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38126"
},
{
"name": "CVE-2025-38149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38149"
},
{
"name": "CVE-2025-39763",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39763"
},
{
"name": "CVE-2025-38399",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38399"
},
{
"name": "CVE-2025-40020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40020"
},
{
"name": "CVE-2025-38065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38065"
},
{
"name": "CVE-2025-38693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38693"
},
{
"name": "CVE-2025-38679",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38679"
},
{
"name": "CVE-2025-38459",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38459"
},
{
"name": "CVE-2025-40188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40188"
},
{
"name": "CVE-2025-40271",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40271"
},
{
"name": "CVE-2025-40291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40291"
},
{
"name": "CVE-2025-38685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38685"
},
{
"name": "CVE-2025-40359",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40359"
},
{
"name": "CVE-2025-38412",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38412"
},
{
"name": "CVE-2025-38031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38031"
},
{
"name": "CVE-2025-40186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40186"
},
{
"name": "CVE-2025-38293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38293"
},
{
"name": "CVE-2025-40073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40073"
},
{
"name": "CVE-2025-38648",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38648"
},
{
"name": "CVE-2025-38278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38278"
},
{
"name": "CVE-2025-37764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37764"
},
{
"name": "CVE-2025-38184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38184"
},
{
"name": "CVE-2025-37741",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37741"
},
{
"name": "CVE-2025-38053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38053"
},
{
"name": "CVE-2025-40242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40242"
},
{
"name": "CVE-2025-37822",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37822"
},
{
"name": "CVE-2025-37912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37912"
},
{
"name": "CVE-2025-38482",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38482"
},
{
"name": "CVE-2025-37820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37820"
},
{
"name": "CVE-2025-68198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68198"
},
{
"name": "CVE-2025-37985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37985"
},
{
"name": "CVE-2025-68314",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68314"
},
{
"name": "CVE-2025-38634",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38634"
},
{
"name": "CVE-2025-40212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40212"
},
{
"name": "CVE-2025-37787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37787"
},
{
"name": "CVE-2025-38008",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38008"
},
{
"name": "CVE-2025-38458",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38458"
},
{
"name": "CVE-2025-39730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39730"
},
{
"name": "CVE-2025-38011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38011"
},
{
"name": "CVE-2025-68190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68190"
},
{
"name": "CVE-2025-38034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38034"
},
{
"name": "CVE-2025-40086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40086"
},
{
"name": "CVE-2025-68242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68242"
},
{
"name": "CVE-2025-38135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38135"
},
{
"name": "CVE-2025-38619",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38619"
},
{
"name": "CVE-2025-40169",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40169"
},
{
"name": "CVE-2025-38312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38312"
},
{
"name": "CVE-2025-38095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38095"
},
{
"name": "CVE-2025-37878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37878"
},
{
"name": "CVE-2025-39737",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39737"
},
{
"name": "CVE-2025-38464",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38464"
},
{
"name": "CVE-2025-40049",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40049"
},
{
"name": "CVE-2025-68322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68322"
},
{
"name": "CVE-2025-38363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38363"
},
{
"name": "CVE-2025-38702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38702"
},
{
"name": "CVE-2025-38319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38319"
},
{
"name": "CVE-2022-49698",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49698"
},
{
"name": "CVE-2025-40238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40238"
},
{
"name": "CVE-2025-38724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38724"
},
{
"name": "CVE-2025-68205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68205"
},
{
"name": "CVE-2025-40277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40277"
},
{
"name": "CVE-2025-40070",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40070"
},
{
"name": "CVE-2025-38250",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38250"
},
{
"name": "CVE-2025-38457",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38457"
},
{
"name": "CVE-2025-38582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38582"
},
{
"name": "CVE-2025-37813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37813"
},
{
"name": "CVE-2025-38543",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38543"
},
{
"name": "CVE-2025-38698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38698"
},
{
"name": "CVE-2025-38212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38212"
},
{
"name": "CVE-2025-40106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40106"
},
{
"name": "CVE-2025-68174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68174"
},
{
"name": "CVE-2025-38298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38298"
},
{
"name": "CVE-2025-40272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40272"
},
{
"name": "CVE-2025-39739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39739"
},
{
"name": "CVE-2025-38024",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38024"
},
{
"name": "CVE-2025-40047",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40047"
},
{
"name": "CVE-2025-38496",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38496"
},
{
"name": "CVE-2025-38078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38078"
},
{
"name": "CVE-2025-38419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38419"
},
{
"name": "CVE-2025-40136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40136"
},
{
"name": "CVE-2025-38533",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38533"
},
{
"name": "CVE-2025-40344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40344"
},
{
"name": "CVE-2025-40205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40205"
},
{
"name": "CVE-2025-40354",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40354"
},
{
"name": "CVE-2025-38169",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38169"
},
{
"name": "CVE-2025-37931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37931"
},
{
"name": "CVE-2025-38511",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38511"
},
{
"name": "CVE-2025-38537",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38537"
},
{
"name": "CVE-2025-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38546"
},
{
"name": "CVE-2025-38211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38211"
},
{
"name": "CVE-2025-40033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40033"
},
{
"name": "CVE-2025-38057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38057"
},
{
"name": "CVE-2025-40122",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40122"
},
{
"name": "CVE-2025-68188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68188"
},
{
"name": "CVE-2025-40269",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40269"
},
{
"name": "CVE-2025-37887",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37887"
},
{
"name": "CVE-2025-38077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38077"
},
{
"name": "CVE-2025-38251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38251"
},
{
"name": "CVE-2025-37861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37861"
},
{
"name": "CVE-2025-68319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68319"
},
{
"name": "CVE-2025-40119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40119"
},
{
"name": "CVE-2025-38120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38120"
},
{
"name": "CVE-2025-38285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38285"
},
{
"name": "CVE-2025-39743",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39743"
},
{
"name": "CVE-2025-39718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39718"
},
{
"name": "CVE-2025-37938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37938"
},
{
"name": "CVE-2025-38005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38005"
},
{
"name": "CVE-2025-38368",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38368"
},
{
"name": "CVE-2025-40075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40075"
},
{
"name": "CVE-2025-38161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38161"
},
{
"name": "CVE-2025-38331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38331"
},
{
"name": "CVE-2025-38354",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38354"
},
{
"name": "CVE-2025-40138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40138"
},
{
"name": "CVE-2025-38712",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38712"
},
{
"name": "CVE-2025-38732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38732"
},
{
"name": "CVE-2025-39773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39773"
},
{
"name": "CVE-2025-38696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38696"
},
{
"name": "CVE-2025-40143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40143"
},
{
"name": "CVE-2025-68189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68189"
},
{
"name": "CVE-2025-38274",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38274"
},
{
"name": "CVE-2025-40076",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40076"
},
{
"name": "CVE-2025-40027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40027"
},
{
"name": "CVE-2025-39885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39885"
},
{
"name": "CVE-2025-68180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68180"
},
{
"name": "CVE-2025-37874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37874"
},
{
"name": "CVE-2025-38115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38115"
},
{
"name": "CVE-2025-38632",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38632"
},
{
"name": "CVE-2025-37988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37988"
},
{
"name": "CVE-2025-23158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23158"
},
{
"name": "CVE-2025-23144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23144"
},
{
"name": "CVE-2025-38153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38153"
},
{
"name": "CVE-2025-37969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37969"
},
{
"name": "CVE-2025-38548",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38548"
},
{
"name": "CVE-2025-37816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37816"
},
{
"name": "CVE-2025-40362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40362"
},
{
"name": "CVE-2025-37742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37742"
},
{
"name": "CVE-2025-68201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68201"
},
{
"name": "CVE-2025-40289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40289"
},
{
"name": "CVE-2025-37765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37765"
},
{
"name": "CVE-2025-38395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38395"
},
{
"name": "CVE-2025-37921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37921"
},
{
"name": "CVE-2025-38507",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38507"
},
{
"name": "CVE-2025-40230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40230"
},
{
"name": "CVE-2025-39989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39989"
},
{
"name": "CVE-2025-38337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38337"
},
{
"name": "CVE-2025-38014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38014"
},
{
"name": "CVE-2025-38258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38258"
},
{
"name": "CVE-2025-37828",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37828"
},
{
"name": "CVE-2025-37769",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37769"
},
{
"name": "CVE-2025-38465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38465"
},
{
"name": "CVE-2025-38513",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38513"
},
{
"name": "CVE-2025-39970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39970"
},
{
"name": "CVE-2025-40292",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40292"
},
{
"name": "CVE-2025-38086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38086"
},
{
"name": "CVE-2025-68181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68181"
},
{
"name": "CVE-2025-37935",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37935"
},
{
"name": "CVE-2025-40032",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40032"
},
{
"name": "CVE-2025-38396",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38396"
},
{
"name": "CVE-2025-23161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23161"
},
{
"name": "CVE-2025-38407",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38407"
},
{
"name": "CVE-2025-39994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39994"
},
{
"name": "CVE-2025-38493",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38493"
},
{
"name": "CVE-2025-37803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37803"
},
{
"name": "CVE-2025-40228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40228"
},
{
"name": "CVE-2025-40150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40150"
},
{
"name": "CVE-2025-38670",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38670"
},
{
"name": "CVE-2025-39732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39732"
},
{
"name": "CVE-2025-37824",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37824"
},
{
"name": "CVE-2025-40274",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40274"
},
{
"name": "CVE-2025-38602",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38602"
},
{
"name": "CVE-2025-38003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38003"
},
{
"name": "CVE-2025-38441",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38441"
},
{
"name": "CVE-2025-40206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40206"
},
{
"name": "CVE-2025-40218",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40218"
},
{
"name": "CVE-2025-38007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38007"
},
{
"name": "CVE-2025-37923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37923"
},
{
"name": "CVE-2025-40088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40088"
},
{
"name": "CVE-2025-40220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40220"
},
{
"name": "CVE-2025-38142",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38142"
},
{
"name": "CVE-2025-37739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37739"
},
{
"name": "CVE-2025-38478",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38478"
},
{
"name": "CVE-2025-38568",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38568"
},
{
"name": "CVE-2025-38583",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38583"
},
{
"name": "CVE-2025-39788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39788"
},
{
"name": "CVE-2025-22058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22058"
},
{
"name": "CVE-2025-37831",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37831"
},
{
"name": "CVE-2025-38499",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38499"
},
{
"name": "CVE-2025-68312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68312"
},
{
"name": "CVE-2025-40062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40062"
},
{
"name": "CVE-2025-68194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68194"
},
{
"name": "CVE-2025-38269",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38269"
},
{
"name": "CVE-2025-38079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38079"
},
{
"name": "CVE-2025-37940",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37940"
},
{
"name": "CVE-2025-40336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40336"
},
{
"name": "CVE-2025-37945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37945"
},
{
"name": "CVE-2025-40067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40067"
},
{
"name": "CVE-2025-40109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40109"
},
{
"name": "CVE-2025-40101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40101"
},
{
"name": "CVE-2025-38735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38735"
},
{
"name": "CVE-2025-40006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40006"
},
{
"name": "CVE-2025-68251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68251"
},
{
"name": "CVE-2025-38652",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38652"
},
{
"name": "CVE-2025-38110",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38110"
},
{
"name": "CVE-2025-38422",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38422"
},
{
"name": "CVE-2025-38402",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38402"
},
{
"name": "CVE-2025-39698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39698"
},
{
"name": "CVE-2025-40038",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40038"
},
{
"name": "CVE-2025-37915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37915"
},
{
"name": "CVE-2025-68183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68183"
},
{
"name": "CVE-2025-23146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23146"
},
{
"name": "CVE-2025-37903",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37903"
},
{
"name": "CVE-2025-40353",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40353"
},
{
"name": "CVE-2025-40222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40222"
},
{
"name": "CVE-2025-23142",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23142"
},
{
"name": "CVE-2025-37738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37738"
},
{
"name": "CVE-2025-40011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40011"
},
{
"name": "CVE-2025-38303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38303"
},
{
"name": "CVE-2025-38074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38074"
},
{
"name": "CVE-2025-40085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40085"
},
{
"name": "CVE-2025-38119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38119"
},
{
"name": "CVE-2025-38232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38232"
},
{
"name": "CVE-2025-38245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38245"
},
{
"name": "CVE-2025-40184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40184"
},
{
"name": "CVE-2025-68244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68244"
},
{
"name": "CVE-2025-40231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40231"
},
{
"name": "CVE-2025-38324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38324"
},
{
"name": "CVE-2025-40278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40278"
},
{
"name": "CVE-2025-38018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38018"
},
{
"name": "CVE-2025-40176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40176"
},
{
"name": "CVE-2025-40342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40342"
},
{
"name": "CVE-2025-37830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37830"
},
{
"name": "CVE-2025-38614",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38614"
},
{
"name": "CVE-2025-37991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37991"
},
{
"name": "CVE-2025-38425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38425"
},
{
"name": "CVE-2025-40210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40210"
},
{
"name": "CVE-2025-37978",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37978"
},
{
"name": "CVE-2025-37781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37781"
},
{
"name": "CVE-2025-38210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38210"
},
{
"name": "CVE-2025-38542",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38542"
},
{
"name": "CVE-2025-38664",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38664"
},
{
"name": "CVE-2025-38344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38344"
},
{
"name": "CVE-2025-23145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23145"
},
{
"name": "CVE-2025-23143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23143"
},
{
"name": "CVE-2025-38322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38322"
},
{
"name": "CVE-2025-38088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38088"
},
{
"name": "CVE-2025-23141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23141"
},
{
"name": "CVE-2025-40193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40193"
},
{
"name": "CVE-2025-37823",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37823"
},
{
"name": "CVE-2025-38332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38332"
},
{
"name": "CVE-2025-40148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40148"
},
{
"name": "CVE-2025-40326",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40326"
},
{
"name": "CVE-2025-38386",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38386"
},
{
"name": "CVE-2025-40279",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40279"
},
{
"name": "CVE-2025-38385",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38385"
},
{
"name": "CVE-2025-40201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40201"
},
{
"name": "CVE-2025-37952",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37952"
},
{
"name": "CVE-2025-38694",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38694"
},
{
"name": "CVE-2025-37793",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37793"
},
{
"name": "CVE-2025-40084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40084"
},
{
"name": "CVE-2025-68311",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68311"
},
{
"name": "CVE-2025-37740",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37740"
},
{
"name": "CVE-2025-38676",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38676"
},
{
"name": "CVE-2025-38530",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38530"
},
{
"name": "CVE-2025-38174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38174"
},
{
"name": "CVE-2025-37826",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37826"
},
{
"name": "CVE-2025-37986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37986"
},
{
"name": "CVE-2025-37829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37829"
},
{
"name": "CVE-2025-68320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68320"
},
{
"name": "CVE-2025-40341",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40341"
},
{
"name": "CVE-2025-38409",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38409"
},
{
"name": "CVE-2025-40199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40199"
},
{
"name": "CVE-2025-40183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40183"
},
{
"name": "CVE-2025-38019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38019"
},
{
"name": "CVE-2025-38729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38729"
},
{
"name": "CVE-2025-68172",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68172"
},
{
"name": "CVE-2025-23151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23151"
},
{
"name": "CVE-2025-38037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38037"
},
{
"name": "CVE-2025-39998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39998"
},
{
"name": "CVE-2025-40338",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40338"
},
{
"name": "CVE-2025-40195",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40195"
},
{
"name": "CVE-2025-37796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37796"
},
{
"name": "CVE-2025-37962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37962"
},
{
"name": "CVE-2025-40134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40134"
},
{
"name": "CVE-2025-38681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38681"
},
{
"name": "CVE-2025-37799",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37799"
},
{
"name": "CVE-2025-38593",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38593"
},
{
"name": "CVE-2025-39968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39968"
},
{
"name": "CVE-2025-38342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38342"
},
{
"name": "CVE-2025-39795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39795"
},
{
"name": "CVE-2025-37801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37801"
},
{
"name": "CVE-2025-38167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38167"
},
{
"name": "CVE-2025-37883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37883"
},
{
"name": "CVE-2025-40302",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40302"
},
{
"name": "CVE-2025-37863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37863"
},
{
"name": "CVE-2025-37901",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37901"
},
{
"name": "CVE-2025-38687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38687"
},
{
"name": "CVE-2025-40358",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40358"
},
{
"name": "CVE-2025-37811",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37811"
},
{
"name": "CVE-2025-40165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40165"
},
{
"name": "CVE-2025-38257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38257"
},
{
"name": "CVE-2025-68318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68318"
},
{
"name": "CVE-2025-37864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37864"
},
{
"name": "CVE-2025-38307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38307"
},
{
"name": "CVE-2025-40161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40161"
},
{
"name": "CVE-2025-40357",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40357"
},
{
"name": "CVE-2025-40328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40328"
},
{
"name": "CVE-2025-37916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37916"
},
{
"name": "CVE-2025-40340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40340"
},
{
"name": "CVE-2025-38111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38111"
},
{
"name": "CVE-2025-39986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39986"
},
{
"name": "CVE-2025-37767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37767"
},
{
"name": "CVE-2025-40283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40283"
},
{
"name": "CVE-2025-39955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39955"
},
{
"name": "CVE-2025-40324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40324"
},
{
"name": "CVE-2025-37989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37989"
},
{
"name": "CVE-2025-38529",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38529"
},
{
"name": "CVE-2025-40131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40131"
},
{
"name": "CVE-2025-40146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40146"
},
{
"name": "CVE-2025-38326",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38326"
},
{
"name": "CVE-2025-40177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40177"
},
{
"name": "CVE-2025-38055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38055"
},
{
"name": "CVE-2025-38129",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38129"
},
{
"name": "CVE-2025-38384",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38384"
},
{
"name": "CVE-2025-38334",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38334"
},
{
"name": "CVE-2025-38728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38728"
},
{
"name": "CVE-2025-38424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38424"
},
{
"name": "CVE-2025-38430",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38430"
},
{
"name": "CVE-2025-38715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38715"
},
{
"name": "CVE-2025-39734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39734"
},
{
"name": "CVE-2025-38089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38089"
},
{
"name": "CVE-2025-40226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40226"
},
{
"name": "CVE-2025-40078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40078"
},
{
"name": "CVE-2025-38382",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38382"
},
{
"name": "CVE-2025-40074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40074"
},
{
"name": "CVE-2025-38608",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38608"
},
{
"name": "CVE-2025-40321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40321"
},
{
"name": "CVE-2025-38650",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38650"
},
{
"name": "CVE-2025-40069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40069"
},
{
"name": "CVE-2025-39710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39710"
},
{
"name": "CVE-2025-40116",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40116"
},
{
"name": "CVE-2025-68249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68249"
},
{
"name": "CVE-2025-38124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38124"
},
{
"name": "CVE-2025-39934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39934"
},
{
"name": "CVE-2025-37925",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37925"
},
{
"name": "CVE-2025-40158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40158"
},
{
"name": "CVE-2025-39683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39683"
},
{
"name": "CVE-2025-38420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38420"
},
{
"name": "CVE-2025-38071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38071"
},
{
"name": "CVE-2025-40327",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40327"
},
{
"name": "CVE-2025-40130",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40130"
},
{
"name": "CVE-2025-40179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40179"
},
{
"name": "CVE-2025-37972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37972"
},
{
"name": "CVE-2025-38183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38183"
},
{
"name": "CVE-2025-40127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40127"
},
{
"name": "CVE-2025-37768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37768"
},
{
"name": "CVE-2025-40282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40282"
},
{
"name": "CVE-2025-39794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39794"
},
{
"name": "CVE-2025-38160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38160"
},
{
"name": "CVE-2025-37984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37984"
},
{
"name": "CVE-2025-38528",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38528"
},
{
"name": "CVE-2025-39996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39996"
},
{
"name": "CVE-2025-40168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40168"
},
{
"name": "CVE-2025-37856",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37856"
},
{
"name": "CVE-2025-38107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38107"
},
{
"name": "CVE-2025-38292",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38292"
},
{
"name": "CVE-2025-40053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40053"
},
{
"name": "CVE-2025-38085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38085"
},
{
"name": "CVE-2025-38222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38222"
},
{
"name": "CVE-2025-38010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38010"
},
{
"name": "CVE-2025-38197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38197"
},
{
"name": "CVE-2025-39951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39951"
},
{
"name": "CVE-2025-38468",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38468"
},
{
"name": "CVE-2025-40120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40120"
},
{
"name": "CVE-2025-40185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40185"
},
{
"name": "CVE-2025-38688",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38688"
},
{
"name": "CVE-2025-38333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38333"
},
{
"name": "CVE-2025-40295",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40295"
},
{
"name": "CVE-2025-68192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68192"
},
{
"name": "CVE-2025-37970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37970"
},
{
"name": "CVE-2025-21884",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21884"
},
{
"name": "CVE-2025-37905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37905"
},
{
"name": "CVE-2025-38390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38390"
},
{
"name": "CVE-2025-38013",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38013"
},
{
"name": "CVE-2025-40098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40098"
},
{
"name": "CVE-2025-38059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38059"
},
{
"name": "CVE-2025-38713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38713"
},
{
"name": "CVE-2025-37956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37956"
},
{
"name": "CVE-2025-40243",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40243"
},
{
"name": "CVE-2025-40196",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40196"
},
{
"name": "CVE-2025-38148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38148"
},
{
"name": "CVE-2025-40129",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40129"
},
{
"name": "CVE-2025-38467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38467"
},
{
"name": "CVE-2025-38117",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38117"
},
{
"name": "CVE-2025-38094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38094"
},
{
"name": "CVE-2025-68171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68171"
},
{
"name": "CVE-2025-38072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38072"
},
{
"name": "CVE-2025-37967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37967"
},
{
"name": "CVE-2025-40301",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40301"
},
{
"name": "CVE-2025-38300",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38300"
},
{
"name": "CVE-2025-40040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40040"
},
{
"name": "CVE-2025-38289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38289"
},
{
"name": "CVE-2025-39782",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39782"
},
{
"name": "CVE-2025-68207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68207"
},
{
"name": "CVE-2025-40066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40066"
},
{
"name": "CVE-2025-38075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38075"
},
{
"name": "CVE-2025-37885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37885"
},
{
"name": "CVE-2025-38697",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38697"
},
{
"name": "CVE-2025-37949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37949"
},
{
"name": "CVE-2025-68167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68167"
},
{
"name": "CVE-2025-38691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38691"
},
{
"name": "CVE-2025-40207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40207"
},
{
"name": "CVE-2025-38373",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38373"
},
{
"name": "CVE-2025-38489",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38489"
},
{
"name": "CVE-2025-40095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40095"
},
{
"name": "CVE-2025-37957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37957"
},
{
"name": "CVE-2025-38058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38058"
},
{
"name": "CVE-2025-38483",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38483"
},
{
"name": "CVE-2025-38369",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38369"
},
{
"name": "CVE-2025-39759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39759"
},
{
"name": "CVE-2025-38639",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38639"
},
{
"name": "CVE-2025-38122",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38122"
},
{
"name": "CVE-2025-38612",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38612"
},
{
"name": "CVE-2025-40299",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40299"
},
{
"name": "CVE-2025-38173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38173"
},
{
"name": "CVE-2025-40286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40286"
},
{
"name": "CVE-2025-38143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38143"
},
{
"name": "CVE-2025-38098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38098"
},
{
"name": "CVE-2025-40091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40091"
},
{
"name": "CVE-2025-40318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40318"
},
{
"name": "CVE-2025-38566",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38566"
},
{
"name": "CVE-2025-39721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39721"
},
{
"name": "CVE-2025-68241",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68241"
},
{
"name": "CVE-2025-39760",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39760"
},
{
"name": "CVE-2025-40118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40118"
},
{
"name": "CVE-2025-38718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38718"
},
{
"name": "CVE-2025-38392",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38392"
},
{
"name": "CVE-2025-39673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39673"
},
{
"name": "CVE-2025-38259",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38259"
},
{
"name": "CVE-2025-38663",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38663"
},
{
"name": "CVE-2025-40021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40021"
},
{
"name": "CVE-2025-40135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40135"
},
{
"name": "CVE-2025-38156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38156"
},
{
"name": "CVE-2025-37951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37951"
},
{
"name": "CVE-2025-37840",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37840"
},
{
"name": "CVE-2025-68253",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68253"
},
{
"name": "CVE-2025-68734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68734"
},
{
"name": "CVE-2025-39993",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39993"
},
{
"name": "CVE-2025-37947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37947"
},
{
"name": "CVE-2025-38416",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38416"
},
{
"name": "CVE-2025-37846",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37846"
},
{
"name": "CVE-2025-38722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38722"
},
{
"name": "CVE-2025-38192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38192"
},
{
"name": "CVE-2025-39800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39800"
},
{
"name": "CVE-2025-40044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40044"
},
{
"name": "CVE-2025-38343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38343"
},
{
"name": "CVE-2025-40105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40105"
},
{
"name": "CVE-2025-38202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38202"
},
{
"name": "CVE-2025-40050",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40050"
},
{
"name": "CVE-2025-40072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40072"
},
{
"name": "CVE-2025-40112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40112"
},
{
"name": "CVE-2025-40079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40079"
},
{
"name": "CVE-2025-22101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22101"
},
{
"name": "CVE-2025-38374",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38374"
},
{
"name": "CVE-2025-39703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39703"
},
{
"name": "CVE-2025-38194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38194"
},
{
"name": "CVE-2025-68182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68182"
},
{
"name": "CVE-2025-38549",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38549"
},
{
"name": "CVE-2025-40310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40310"
},
{
"name": "CVE-2025-38665",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38665"
},
{
"name": "CVE-2025-38101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38101"
},
{
"name": "CVE-2025-37982",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37982"
},
{
"name": "CVE-2025-37992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37992"
},
{
"name": "CVE-2025-38577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38577"
},
{
"name": "CVE-2025-38671",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38671"
},
{
"name": "CVE-2025-68317",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68317"
},
{
"name": "CVE-2025-39971",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39971"
},
{
"name": "CVE-2025-38299",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38299"
},
{
"name": "CVE-2025-40154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40154"
},
{
"name": "CVE-2025-40331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40331"
},
{
"name": "CVE-2025-38635",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38635"
},
{
"name": "CVE-2025-38704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38704"
},
{
"name": "CVE-2025-38348",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38348"
},
{
"name": "CVE-2025-40270",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40270"
},
{
"name": "CVE-2025-40191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40191"
},
{
"name": "CVE-2025-38488",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38488"
},
{
"name": "CVE-2025-40189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40189"
},
{
"name": "CVE-2025-40093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40093"
},
{
"name": "CVE-2025-38540",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38540"
},
{
"name": "CVE-2025-38040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38040"
},
{
"name": "CVE-2025-38265",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38265"
},
{
"name": "CVE-2025-23149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23149"
},
{
"name": "CVE-2025-38403",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38403"
},
{
"name": "CVE-2025-21726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21726"
},
{
"name": "CVE-2025-38552",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38552"
},
{
"name": "CVE-2025-40335",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40335"
},
{
"name": "CVE-2025-40149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40149"
},
{
"name": "CVE-2025-37914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37914"
},
{
"name": "CVE-2025-40164",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40164"
},
{
"name": "CVE-2025-37873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37873"
},
{
"name": "CVE-2025-37928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37928"
},
{
"name": "CVE-2025-40267",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40267"
},
{
"name": "CVE-2025-40235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40235"
},
{
"name": "CVE-2025-39766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39766"
},
{
"name": "CVE-2025-39801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39801"
},
{
"name": "CVE-2025-37922",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37922"
},
{
"name": "CVE-2025-38146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38146"
},
{
"name": "CVE-2025-68208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68208"
},
{
"name": "CVE-2025-39724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39724"
},
{
"name": "CVE-2025-39687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39687"
},
{
"name": "CVE-2025-37794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37794"
},
{
"name": "CVE-2025-38510",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38510"
},
{
"name": "CVE-2025-38246",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38246"
},
{
"name": "CVE-2025-39758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39758"
},
{
"name": "CVE-2025-39694",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39694"
},
{
"name": "CVE-2025-38220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38220"
},
{
"name": "CVE-2025-38405",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38405"
},
{
"name": "CVE-2025-38418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38418"
},
{
"name": "CVE-2025-40352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40352"
},
{
"name": "CVE-2025-38090",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38090"
},
{
"name": "CVE-2025-38429",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38429"
},
{
"name": "CVE-2025-38225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38225"
},
{
"name": "CVE-2025-40280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40280"
},
{
"name": "CVE-2025-38155",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38155"
},
{
"name": "CVE-2025-40099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40099"
},
{
"name": "CVE-2025-71162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71162"
},
{
"name": "CVE-2025-37977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37977"
},
{
"name": "CVE-2025-38365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38365"
},
{
"name": "CVE-2025-38415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38415"
},
{
"name": "CVE-2025-40031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40031"
},
{
"name": "CVE-2025-40180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40180"
},
{
"name": "CVE-2025-40293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40293"
},
{
"name": "CVE-2025-38668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38668"
},
{
"name": "CVE-2025-37973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37973"
},
{
"name": "CVE-2025-40330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40330"
},
{
"name": "CVE-2025-68750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68750"
},
{
"name": "CVE-2025-38260",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38260"
},
{
"name": "CVE-2025-37827",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37827"
},
{
"name": "CVE-2025-38721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38721"
},
{
"name": "CVE-2025-38244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38244"
},
{
"name": "CVE-2025-38080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38080"
},
{
"name": "CVE-2025-40126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40126"
},
{
"name": "CVE-2025-39972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39972"
},
{
"name": "CVE-2025-37748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37748"
},
{
"name": "CVE-2025-38364",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38364"
},
{
"name": "CVE-2025-38615",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38615"
},
{
"name": "CVE-2025-39684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39684"
},
{
"name": "CVE-2025-37836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37836"
},
{
"name": "CVE-2025-38526",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38526"
},
{
"name": "CVE-2025-38472",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38472"
},
{
"name": "CVE-2025-37944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37944"
},
{
"name": "CVE-2025-38506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38506"
},
{
"name": "CVE-2025-40320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40320"
},
{
"name": "CVE-2025-38703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38703"
},
{
"name": "CVE-2025-38494",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38494"
},
{
"name": "CVE-2025-39753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39753"
},
{
"name": "CVE-2025-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38604"
},
{
"name": "CVE-2025-40203",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40203"
},
{
"name": "CVE-2025-38623",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38623"
},
{
"name": "CVE-2025-38193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38193"
},
{
"name": "CVE-2025-38400",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38400"
},
{
"name": "CVE-2025-38136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38136"
},
{
"name": "CVE-2025-40192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40192"
},
{
"name": "CVE-2025-38544",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38544"
},
{
"name": "CVE-2025-37771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37771"
},
{
"name": "CVE-2025-39797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39797"
},
{
"name": "CVE-2025-40200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40200"
},
{
"name": "CVE-2025-38236",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38236"
},
{
"name": "CVE-2025-38725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38725"
},
{
"name": "CVE-2025-37975",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37975"
},
{
"name": "CVE-2025-40124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40124"
},
{
"name": "CVE-2025-38347",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38347"
},
{
"name": "CVE-2025-39776",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39776"
},
{
"name": "CVE-2025-39880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39880"
},
{
"name": "CVE-2025-37998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37998"
},
{
"name": "CVE-2025-38198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38198"
},
{
"name": "CVE-2025-23163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23163"
},
{
"name": "CVE-2025-40094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40094"
},
{
"name": "CVE-2025-37968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37968"
},
{
"name": "CVE-2025-38376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38376"
},
{
"name": "CVE-2025-38006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38006"
},
{
"name": "CVE-2025-40102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40102"
},
{
"name": "CVE-2025-40170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40170"
},
{
"name": "CVE-2025-38437",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38437"
},
{
"name": "CVE-2025-40160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40160"
},
{
"name": "CVE-2025-40284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40284"
},
{
"name": "CVE-2025-38125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38125"
},
{
"name": "CVE-2025-40209",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40209"
},
{
"name": "CVE-2025-40077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40077"
},
{
"name": "CVE-2025-38351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38351"
},
{
"name": "CVE-2025-38048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38048"
},
{
"name": "CVE-2025-40071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40071"
},
{
"name": "CVE-2025-38683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38683"
},
{
"name": "CVE-2025-40113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40113"
},
{
"name": "CVE-2025-39736",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39736"
},
{
"name": "CVE-2025-40234",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40234"
},
{
"name": "CVE-2025-37757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37757"
},
{
"name": "CVE-2025-68247",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68247"
},
{
"name": "CVE-2025-40305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40305"
},
{
"name": "CVE-2025-40080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40080"
},
{
"name": "CVE-2025-38009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38009"
},
{
"name": "CVE-2025-40215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40215"
},
{
"name": "CVE-2025-40307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40307"
},
{
"name": "CVE-2025-40111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40111"
},
{
"name": "CVE-2025-38081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38081"
},
{
"name": "CVE-2025-37809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37809"
},
{
"name": "CVE-2024-36350",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36350"
},
{
"name": "CVE-2025-40211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40211"
},
{
"name": "CVE-2025-40068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40068"
},
{
"name": "CVE-2025-38185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38185"
},
{
"name": "CVE-2025-39691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39691"
},
{
"name": "CVE-2025-38406",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38406"
},
{
"name": "CVE-2025-68315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68315"
},
{
"name": "CVE-2025-40163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40163"
},
{
"name": "CVE-2025-40042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40042"
},
{
"name": "CVE-2025-37817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37817"
},
{
"name": "CVE-2025-40155",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40155"
},
{
"name": "CVE-2025-39890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39890"
},
{
"name": "CVE-2025-39742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39742"
},
{
"name": "CVE-2025-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40217"
},
{
"name": "CVE-2025-22102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22102"
},
{
"name": "CVE-2025-37987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37987"
},
{
"name": "CVE-2025-37749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37749"
},
{
"name": "CVE-2024-36331",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36331"
},
{
"name": "CVE-2025-39748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39748"
},
{
"name": "CVE-2025-40133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40133"
},
{
"name": "CVE-2025-38263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38263"
},
{
"name": "CVE-2025-38610",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38610"
},
{
"name": "CVE-2025-37772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37772"
},
{
"name": "CVE-2025-38214",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38214"
},
{
"name": "CVE-2025-38560",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38560"
},
{
"name": "CVE-2025-37994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37994"
},
{
"name": "CVE-2025-38551",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38551"
},
{
"name": "CVE-2025-38701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38701"
},
{
"name": "CVE-2025-38218",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38218"
},
{
"name": "CVE-2025-40329",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40329"
},
{
"name": "CVE-2025-38349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38349"
},
{
"name": "CVE-2025-39726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39726"
},
{
"name": "CVE-2025-38393",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38393"
},
{
"name": "CVE-2025-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37891"
},
{
"name": "CVE-2025-38249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38249"
},
{
"name": "CVE-2025-38716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38716"
},
{
"name": "CVE-2025-39937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39937"
},
{
"name": "CVE-2025-37858",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37858"
},
{
"name": "CVE-2025-38154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38154"
},
{
"name": "CVE-2025-38469",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38469"
},
{
"name": "CVE-2025-38581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38581"
},
{
"name": "CVE-2025-40034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40034"
},
{
"name": "CVE-2025-40060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40060"
},
{
"name": "CVE-2025-39790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39790"
},
{
"name": "CVE-2025-38389",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38389"
},
{
"name": "CVE-2025-38448",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38448"
},
{
"name": "CVE-2025-37780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37780"
},
{
"name": "CVE-2025-37995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37995"
},
{
"name": "CVE-2025-38680",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38680"
},
{
"name": "CVE-2025-37754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37754"
},
{
"name": "CVE-2025-40059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40059"
},
{
"name": "CVE-2025-38497",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38497"
},
{
"name": "CVE-2025-68168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68168"
},
{
"name": "CVE-2025-23156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23156"
},
{
"name": "CVE-2025-23157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23157"
},
{
"name": "CVE-2025-68206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68206"
},
{
"name": "CVE-2025-68309",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68309"
},
{
"name": "CVE-2025-38684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38684"
},
{
"name": "CVE-2025-38165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38165"
},
{
"name": "CVE-2025-40003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40003"
},
{
"name": "CVE-2025-39686",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39686"
},
{
"name": "CVE-2025-39798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39798"
},
{
"name": "CVE-2025-38495",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38495"
},
{
"name": "CVE-2025-37808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37808"
},
{
"name": "CVE-2025-38730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38730"
},
{
"name": "CVE-2025-38052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38052"
},
{
"name": "CVE-2025-38377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38377"
},
{
"name": "CVE-2025-40175",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40175"
},
{
"name": "CVE-2025-68170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68170"
},
{
"name": "CVE-2025-39747",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39747"
},
{
"name": "CVE-2025-68313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68313"
},
{
"name": "CVE-2025-38516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38516"
},
{
"name": "CVE-2025-38462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38462"
},
{
"name": "CVE-2025-38428",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38428"
},
{
"name": "CVE-2025-39714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39714"
},
{
"name": "CVE-2025-38262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38262"
},
{
"name": "CVE-2025-38138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38138"
},
{
"name": "CVE-2025-38035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38035"
},
{
"name": "CVE-2025-37759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37759"
},
{
"name": "CVE-2025-38414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38414"
},
{
"name": "CVE-2025-68197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68197"
},
{
"name": "CVE-2025-40123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40123"
},
{
"name": "CVE-2025-37933",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37933"
},
{
"name": "CVE-2025-38310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38310"
},
{
"name": "CVE-2025-37886",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37886"
},
{
"name": "CVE-2025-37963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37963"
},
{
"name": "CVE-2025-40297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40297"
},
{
"name": "CVE-2025-38226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38226"
},
{
"name": "CVE-2025-39706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39706"
},
{
"name": "CVE-2025-40178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40178"
},
{
"name": "CVE-2025-40363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40363"
},
{
"name": "CVE-2025-38443",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38443"
},
{
"name": "CVE-2025-38576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38576"
},
{
"name": "CVE-2025-39869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39869"
},
{
"name": "CVE-2025-37800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37800"
},
{
"name": "CVE-2025-39985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39985"
},
{
"name": "CVE-2025-40276",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40276"
},
{
"name": "CVE-2025-37900",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37900"
},
{
"name": "CVE-2025-40224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40224"
},
{
"name": "CVE-2025-38439",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38439"
},
{
"name": "CVE-2025-37805",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37805"
},
{
"name": "CVE-2025-68245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68245"
},
{
"name": "CVE-2025-39719",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39719"
},
{
"name": "CVE-2025-40317",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40317"
},
{
"name": "CVE-2025-40236",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40236"
},
{
"name": "CVE-2025-37990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37990"
},
{
"name": "CVE-2025-38553",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38553"
},
{
"name": "CVE-2025-38190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38190"
},
{
"name": "CVE-2025-38180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38180"
},
{
"name": "CVE-2025-39738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39738"
},
{
"name": "CVE-2025-68202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68202"
},
{
"name": "CVE-2025-38145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38145"
},
{
"name": "CVE-2025-40174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40174"
},
{
"name": "CVE-2025-37948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37948"
},
{
"name": "CVE-2025-38166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38166"
},
{
"name": "CVE-2025-40227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40227"
},
{
"name": "CVE-2025-37862",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37862"
},
{
"name": "CVE-2025-38321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38321"
},
{
"name": "CVE-2025-39705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39705"
},
{
"name": "CVE-2025-40316",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40316"
},
{
"name": "CVE-2025-37960",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37960"
},
{
"name": "CVE-2025-38045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38045"
},
{
"name": "CVE-2025-38051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38051"
},
{
"name": "CVE-2025-39713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39713"
},
{
"name": "CVE-2025-37763",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37763"
},
{
"name": "CVE-2025-37954",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37954"
},
{
"name": "CVE-2025-22128",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22128"
},
{
"name": "CVE-2025-40065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40065"
},
{
"name": "CVE-2025-37839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37839"
},
{
"name": "CVE-2025-39744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39744"
},
{
"name": "CVE-2025-38277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38277"
},
{
"name": "CVE-2025-37913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37913"
},
{
"name": "CVE-2025-68177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68177"
},
{
"name": "CVE-2025-39756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39756"
},
{
"name": "CVE-2025-38539",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38539"
},
{
"name": "CVE-2025-40181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40181"
},
{
"name": "CVE-2025-68191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68191"
},
{
"name": "CVE-2025-38044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38044"
},
{
"name": "CVE-2025-68250",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68250"
},
{
"name": "CVE-2025-37786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37786"
},
{
"name": "CVE-2025-40141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40141"
},
{
"name": "CVE-2025-38200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38200"
},
{
"name": "CVE-2025-38480",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38480"
},
{
"name": "CVE-2025-40132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40132"
},
{
"name": "CVE-2025-38346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38346"
},
{
"name": "CVE-2025-40152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40152"
},
{
"name": "CVE-2025-37959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37959"
},
{
"name": "CVE-2025-38191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38191"
},
{
"name": "CVE-2025-39946",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39946"
},
{
"name": "CVE-2025-38062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38062"
},
{
"name": "CVE-2025-38531",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38531"
},
{
"name": "CVE-2025-40288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40288"
},
{
"name": "CVE-2025-68239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68239"
},
{
"name": "CVE-2025-39693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39693"
},
{
"name": "CVE-2025-40281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40281"
},
{
"name": "CVE-2025-68185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68185"
},
{
"name": "CVE-2025-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40304"
},
{
"name": "CVE-2025-38503",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38503"
},
{
"name": "CVE-2025-40110",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40110"
},
{
"name": "CVE-2025-40162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40162"
},
{
"name": "CVE-2025-38630",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38630"
},
{
"name": "CVE-2025-38131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38131"
},
{
"name": "CVE-2025-40268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40268"
},
{
"name": "CVE-2025-39980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39980"
},
{
"name": "CVE-2025-37851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37851"
},
{
"name": "CVE-2025-38481",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38481"
},
{
"name": "CVE-2025-38585",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38585"
},
{
"name": "CVE-2025-38320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38320"
},
{
"name": "CVE-2025-38625",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38625"
},
{
"name": "CVE-2025-38164",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38164"
},
{
"name": "CVE-2025-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40303"
},
{
"name": "CVE-2025-68178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68178"
},
{
"name": "CVE-2025-40337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40337"
},
{
"name": "CVE-2025-40346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40346"
},
{
"name": "CVE-2025-38264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38264"
},
{
"name": "CVE-2025-40036",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40036"
},
{
"name": "CVE-2025-39676",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39676"
},
{
"name": "CVE-2025-40241",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40241"
},
{
"name": "CVE-2025-37980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37980"
},
{
"name": "CVE-2025-38280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38280"
},
{
"name": "CVE-2025-37788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37788"
},
{
"name": "CVE-2025-38427",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38427"
},
{
"name": "CVE-2025-38084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38084"
},
{
"name": "CVE-2025-40046",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40046"
},
{
"name": "CVE-2025-37879",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37879"
},
{
"name": "CVE-2025-38217",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38217"
},
{
"name": "CVE-2025-40030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40030"
},
{
"name": "CVE-2025-40244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40244"
},
{
"name": "CVE-2025-37881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37881"
},
{
"name": "CVE-2025-39995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39995"
},
{
"name": "CVE-2025-38103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38103"
},
{
"name": "CVE-2025-38514",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38514"
},
{
"name": "CVE-2025-39783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39783"
},
{
"name": "CVE-2025-39715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39715"
},
{
"name": "CVE-2025-40323",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40323"
},
{
"name": "CVE-2025-38569",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38569"
},
{
"name": "CVE-2025-38255",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38255"
},
{
"name": "CVE-2025-38512",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38512"
},
{
"name": "CVE-2025-40096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40096"
},
{
"name": "CVE-2025-38622",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38622"
},
{
"name": "CVE-2025-37909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37909"
},
{
"name": "CVE-2025-38700",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38700"
},
{
"name": "CVE-2025-37849",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37849"
},
{
"name": "CVE-2025-38162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38162"
},
{
"name": "CVE-2025-38532",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38532"
},
{
"name": "CVE-2025-39712",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39712"
},
{
"name": "CVE-2025-37812",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37812"
},
{
"name": "CVE-2025-39707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39707"
},
{
"name": "CVE-2025-40275",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40275"
},
{
"name": "CVE-2025-37875",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37875"
},
{
"name": "CVE-2025-38410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38410"
},
{
"name": "CVE-2025-39907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39907"
},
{
"name": "CVE-2025-40182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40182"
},
{
"name": "CVE-2025-68211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68211"
},
{
"name": "CVE-2025-39781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39781"
},
{
"name": "CVE-2025-38640",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38640"
},
{
"name": "CVE-2025-38476",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38476"
},
{
"name": "CVE-2025-38659",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38659"
},
{
"name": "CVE-2025-40339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40339"
},
{
"name": "CVE-2025-40140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40140"
},
{
"name": "CVE-2025-38020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38020"
},
{
"name": "CVE-2025-40223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40223"
},
{
"name": "CVE-2025-38572",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38572"
},
{
"name": "CVE-2025-23140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23140"
},
{
"name": "CVE-2025-23150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23150"
},
{
"name": "CVE-2025-38460",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38460"
},
{
"name": "CVE-2025-40061",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40061"
},
{
"name": "CVE-2025-38182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38182"
},
{
"name": "CVE-2025-38550",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38550"
},
{
"name": "CVE-2024-53114",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53114"
},
{
"name": "CVE-2025-38275",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38275"
},
{
"name": "CVE-2025-40213",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40213"
},
{
"name": "CVE-2025-38345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38345"
},
{
"name": "CVE-2025-40334",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40334"
},
{
"name": "CVE-2025-38170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38170"
},
{
"name": "CVE-2025-39711",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39711"
},
{
"name": "CVE-2025-22115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22115"
},
{
"name": "CVE-2025-22120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22120"
},
{
"name": "CVE-2025-38535",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38535"
},
{
"name": "CVE-2025-38231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38231"
},
{
"name": "CVE-2025-37854",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37854"
},
{
"name": "CVE-2025-40142",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40142"
},
{
"name": "CVE-2025-39873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39873"
},
{
"name": "CVE-2025-40159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40159"
},
{
"name": "CVE-2025-40319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40319"
},
{
"name": "CVE-2025-68193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68193"
},
{
"name": "CVE-2025-38473",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38473"
},
{
"name": "CVE-2025-38113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38113"
},
{
"name": "CVE-2025-38714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38714"
},
{
"name": "CVE-2025-23148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23148"
},
{
"name": "CVE-2025-38361",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38361"
},
{
"name": "CVE-2025-38470",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38470"
},
{
"name": "CVE-2025-38181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38181"
},
{
"name": "CVE-2025-40051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40051"
},
{
"name": "CVE-2025-38391",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38391"
},
{
"name": "CVE-2025-38248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38248"
},
{
"name": "CVE-2025-40351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40351"
},
{
"name": "CVE-2025-40087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40087"
},
{
"name": "CVE-2025-40229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40229"
},
{
"name": "CVE-2025-23147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23147"
},
{
"name": "CVE-2025-39752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39752"
}
],
"initial_release_date": "2026-02-13T00:00:00",
"last_revision_date": "2026-02-13T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0169",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-02-13T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux d\u0027Ubuntu. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et un contournement de la politique de s\u00e9curit\u00e9.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": "2026-02-06",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8015-3",
"url": "https://ubuntu.com/security/notices/USN-8015-3"
},
{
"published_at": "2026-02-12",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8031-1",
"url": "https://ubuntu.com/security/notices/USN-8031-1"
},
{
"published_at": "2026-02-13",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8033-4",
"url": "https://ubuntu.com/security/notices/USN-8033-4"
},
{
"published_at": "2026-02-12",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8034-1",
"url": "https://ubuntu.com/security/notices/USN-8034-1"
},
{
"published_at": "2026-02-12",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7988-5",
"url": "https://ubuntu.com/security/notices/USN-7988-5"
},
{
"published_at": "2026-02-11",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7990-3",
"url": "https://ubuntu.com/security/notices/USN-7990-3"
},
{
"published_at": "2026-02-12",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8033-2",
"url": "https://ubuntu.com/security/notices/USN-8033-2"
},
{
"published_at": "2026-02-11",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8015-4",
"url": "https://ubuntu.com/security/notices/USN-8015-4"
},
{
"published_at": "2026-02-12",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8029-1",
"url": "https://ubuntu.com/security/notices/USN-8029-1"
},
{
"published_at": "2026-02-12",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8028-2",
"url": "https://ubuntu.com/security/notices/USN-8028-2"
},
{
"published_at": "2026-02-12",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8033-3",
"url": "https://ubuntu.com/security/notices/USN-8033-3"
},
{
"published_at": "2026-02-11",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8013-4",
"url": "https://ubuntu.com/security/notices/USN-8013-4"
},
{
"published_at": "2026-02-12",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7990-4",
"url": "https://ubuntu.com/security/notices/USN-7990-4"
},
{
"published_at": "2026-02-11",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7988-4",
"url": "https://ubuntu.com/security/notices/USN-7988-4"
},
{
"published_at": "2026-02-12",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8033-1",
"url": "https://ubuntu.com/security/notices/USN-8033-1"
},
{
"published_at": "2026-02-12",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8030-1",
"url": "https://ubuntu.com/security/notices/USN-8030-1"
},
{
"published_at": "2026-02-11",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8028-1",
"url": "https://ubuntu.com/security/notices/USN-8028-1"
}
]
}
CERTFR-2026-AVI-0316
Vulnerability from certfr_avis - Published: 2026-03-19 - Updated: 2026-03-19
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | N/A | NodeJS Buildpack versions antérieures à 1.8.82 | ||
| VMware | Tanzu Platform | Tanzu for MySQL sur Tanzu Platform versions antérieures à 10.1.1 | ||
| VMware | N/A | Java Buildpack versions antérieures à 4.90.0 | ||
| VMware | N/A | NGINX Buildpack versions antérieures à 1.2.71 | ||
| VMware | N/A | HWC Buildpack versions antérieures à 3.1.91 | ||
| VMware | Tanzu Platform | Foundation Core for VMware Tanzu Platform versions antérieures à 3.1.9 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "NodeJS Buildpack versions ant\u00e9rieures \u00e0 1.8.82",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu for MySQL sur Tanzu Platform versions ant\u00e9rieures \u00e0 10.1.1",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Java Buildpack versions ant\u00e9rieures \u00e0 4.90.0",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "NGINX Buildpack versions ant\u00e9rieures \u00e0 1.2.71",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "HWC Buildpack versions ant\u00e9rieures \u00e0 3.1.91",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Foundation Core for VMware Tanzu Platform versions ant\u00e9rieures \u00e0 3.1.9",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2026-28422",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28422"
},
{
"name": "CVE-2024-36903",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36903"
},
{
"name": "CVE-2024-35875",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35875"
},
{
"name": "CVE-2022-50759",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50759"
},
{
"name": "CVE-2026-26007",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26007"
},
{
"name": "CVE-2025-71075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71075"
},
{
"name": "CVE-2024-49912",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49912"
},
{
"name": "CVE-2024-36026",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36026"
},
{
"name": "CVE-2026-23198",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23198"
},
{
"name": "CVE-2023-3640",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3640"
},
{
"name": "CVE-2024-27435",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27435"
},
{
"name": "CVE-2025-40273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40273"
},
{
"name": "CVE-2023-53714",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53714"
},
{
"name": "CVE-2024-42122",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42122"
},
{
"name": "CVE-2025-68230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68230"
},
{
"name": "CVE-2026-28420",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28420"
},
{
"name": "CVE-2022-49069",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49069"
},
{
"name": "CVE-2024-57875",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57875"
},
{
"name": "CVE-2022-27943",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27943"
},
{
"name": "CVE-2025-40064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40064"
},
{
"name": "CVE-2023-54129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54129"
},
{
"name": "CVE-2025-66865",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66865"
},
{
"name": "CVE-2024-41031",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41031"
},
{
"name": "CVE-2025-39992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39992"
},
{
"name": "CVE-2025-69534",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69534"
},
{
"name": "CVE-2025-61730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61730"
},
{
"name": "CVE-2022-49543",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49543"
},
{
"name": "CVE-2026-23202",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23202"
},
{
"name": "CVE-2025-38485",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38485"
},
{
"name": "CVE-2023-53562",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53562"
},
{
"name": "CVE-2025-68324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68324"
},
{
"name": "CVE-2025-22026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22026"
},
{
"name": "CVE-2023-54149",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54149"
},
{
"name": "CVE-2025-71086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71086"
},
{
"name": "CVE-2024-50063",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50063"
},
{
"name": "CVE-2023-33875",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33875"
},
{
"name": "CVE-2024-41001",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41001"
},
{
"name": "CVE-2024-42155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42155"
},
{
"name": "CVE-2026-23167",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23167"
},
{
"name": "CVE-2025-36353",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36353"
},
{
"name": "CVE-2025-68196",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68196"
},
{
"name": "CVE-2024-46770",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46770"
},
{
"name": "CVE-2023-53247",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53247"
},
{
"name": "CVE-2025-38042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38042"
},
{
"name": "CVE-2025-22083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22083"
},
{
"name": "CVE-2023-53829",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53829"
},
{
"name": "CVE-2025-58183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58183"
},
{
"name": "CVE-2023-54002",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54002"
},
{
"name": "CVE-2022-50550",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50550"
},
{
"name": "CVE-2022-0400",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0400"
},
{
"name": "CVE-2022-49138",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49138"
},
{
"name": "CVE-2025-66199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66199"
},
{
"name": "CVE-2024-42239",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42239"
},
{
"name": "CVE-2022-49359",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49359"
},
{
"name": "CVE-2025-68342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68342"
},
{
"name": "CVE-2022-48673",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48673"
},
{
"name": "CVE-2022-50425",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50425"
},
{
"name": "CVE-2025-38201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38201"
},
{
"name": "CVE-2024-39293",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39293"
},
{
"name": "CVE-2023-53008",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53008"
},
{
"name": "CVE-2025-38669",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38669"
},
{
"name": "CVE-2025-40137",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40137"
},
{
"name": "CVE-2023-54052",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54052"
},
{
"name": "CVE-2025-22107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22107"
},
{
"name": "CVE-2024-38306",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38306"
},
{
"name": "CVE-2023-53733",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53733"
},
{
"name": "CVE-2025-37775",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37775"
},
{
"name": "CVE-2025-21682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21682"
},
{
"name": "CVE-2023-1386",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1386"
},
{
"name": "CVE-2024-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35939"
},
{
"name": "CVE-2024-39298",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39298"
},
{
"name": "CVE-2024-56703",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56703"
},
{
"name": "CVE-2026-23098",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23098"
},
{
"name": "CVE-2023-53347",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53347"
},
{
"name": "CVE-2023-28374",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28374"
},
{
"name": "CVE-2023-52926",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52926"
},
{
"name": "CVE-2026-32597",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32597"
},
{
"name": "CVE-2025-68286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68286"
},
{
"name": "CVE-2025-9231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9231"
},
{
"name": "CVE-2024-36921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36921"
},
{
"name": "CVE-2025-40057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40057"
},
{
"name": "CVE-2024-41050",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41050"
},
{
"name": "CVE-2026-25500",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25500"
},
{
"name": "CVE-2024-26656",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26656"
},
{
"name": "CVE-2025-38520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38520"
},
{
"name": "CVE-2025-27558",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27558"
},
{
"name": "CVE-2025-71094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71094"
},
{
"name": "CVE-2026-21637",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21637"
},
{
"name": "CVE-2024-35998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35998"
},
{
"name": "CVE-2024-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
},
{
"name": "CVE-2021-0076",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0076"
},
{
"name": "CVE-2025-68788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68788"
},
{
"name": "CVE-2024-58237",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58237"
},
{
"name": "CVE-2024-36909",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36909"
},
{
"name": "CVE-2024-42147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42147"
},
{
"name": "CVE-2023-53529",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53529"
},
{
"name": "CVE-2024-50028",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50028"
},
{
"name": "CVE-2023-53042",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53042"
},
{
"name": "CVE-2022-50527",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50527"
},
{
"name": "CVE-2023-54280",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54280"
},
{
"name": "CVE-2025-21786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21786"
},
{
"name": "CVE-2024-58094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58094"
},
{
"name": "CVE-2024-11187",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11187"
},
{
"name": "CVE-2025-52534",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52534"
},
{
"name": "CVE-2025-40314",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40314"
},
{
"name": "CVE-2024-46705",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46705"
},
{
"name": "CVE-2022-50407",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50407"
},
{
"name": "CVE-2026-23196",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23196"
},
{
"name": "CVE-2024-26595",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26595"
},
{
"name": "CVE-2022-23825",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23825"
},
{
"name": "CVE-2024-45775",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45775"
},
{
"name": "CVE-2025-40306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40306"
},
{
"name": "CVE-2025-21881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21881"
},
{
"name": "CVE-2022-49901",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49901"
},
{
"name": "CVE-2026-23126",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23126"
},
{
"name": "CVE-2025-38329",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38329"
},
{
"name": "CVE-2021-33096",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33096"
},
{
"name": "CVE-2022-50230",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50230"
},
{
"name": "CVE-2024-35949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35949"
},
{
"name": "CVE-2025-39947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39947"
},
{
"name": "CVE-2025-68778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68778"
},
{
"name": "CVE-2023-53588",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53588"
},
{
"name": "CVE-2024-41082",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41082"
},
{
"name": "CVE-2023-53685",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53685"
},
{
"name": "CVE-2025-5222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5222"
},
{
"name": "CVE-2025-23155",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23155"
},
{
"name": "CVE-2026-23054",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23054"
},
{
"name": "CVE-2025-37870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37870"
},
{
"name": "CVE-2025-40254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40254"
},
{
"name": "CVE-2022-49533",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49533"
},
{
"name": "CVE-2024-42253",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42253"
},
{
"name": "CVE-2020-26557",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26557"
},
{
"name": "CVE-2025-71064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71064"
},
{
"name": "CVE-2023-54201",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54201"
},
{
"name": "CVE-2021-33114",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33114"
},
{
"name": "CVE-2025-69645",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69645"
},
{
"name": "CVE-2025-68200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68200"
},
{
"name": "CVE-2022-49518",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49518"
},
{
"name": "CVE-2024-56727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56727"
},
{
"name": "CVE-2022-49125",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49125"
},
{
"name": "CVE-2024-36900",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36900"
},
{
"name": "CVE-2025-38501",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38501"
},
{
"name": "CVE-2024-26866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26866"
},
{
"name": "CVE-2024-27010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27010"
},
{
"name": "CVE-2025-27516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27516"
},
{
"name": "CVE-2025-68736",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68736"
},
{
"name": "CVE-2023-52561",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52561"
},
{
"name": "CVE-2025-68725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68725"
},
{
"name": "CVE-2024-53221",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53221"
},
{
"name": "CVE-2024-41069",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41069"
},
{
"name": "CVE-2025-68176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68176"
},
{
"name": "CVE-2025-37777",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37777"
},
{
"name": "CVE-2021-47432",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47432"
},
{
"name": "CVE-2025-68204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68204"
},
{
"name": "CVE-2024-35878",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35878"
},
{
"name": "CVE-2023-53362",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53362"
},
{
"name": "CVE-2025-68795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68795"
},
{
"name": "CVE-2025-68349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68349"
},
{
"name": "CVE-2024-26756",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26756"
},
{
"name": "CVE-2022-50815",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50815"
},
{
"name": "CVE-2025-21931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21931"
},
{
"name": "CVE-2025-39826",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39826"
},
{
"name": "CVE-2025-38036",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38036"
},
{
"name": "CVE-2025-2668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2668"
},
{
"name": "CVE-2025-71221",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71221"
},
{
"name": "CVE-2025-37778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37778"
},
{
"name": "CVE-2025-39716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39716"
},
{
"name": "CVE-2024-46860",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46860"
},
{
"name": "CVE-2025-22040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22040"
},
{
"name": "CVE-2024-53095",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53095"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2025-8277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8277"
},
{
"name": "CVE-2025-8941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8941"
},
{
"name": "CVE-2022-38457",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38457"
},
{
"name": "CVE-2024-56665",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56665"
},
{
"name": "CVE-2025-38340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38340"
},
{
"name": "CVE-2025-38109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38109"
},
{
"name": "CVE-2023-53629",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53629"
},
{
"name": "CVE-2022-50178",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50178"
},
{
"name": "CVE-2025-39779",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39779"
},
{
"name": "CVE-2025-66866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66866"
},
{
"name": "CVE-2025-68283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68283"
},
{
"name": "CVE-2023-7216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7216"
},
{
"name": "CVE-2025-37880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37880"
},
{
"name": "CVE-2025-36427",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36427"
},
{
"name": "CVE-2026-23217",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23217"
},
{
"name": "CVE-2025-15469",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15469"
},
{
"name": "CVE-2025-37833",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37833"
},
{
"name": "CVE-2025-39761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39761"
},
{
"name": "CVE-2024-38608",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38608"
},
{
"name": "CVE-2025-68246",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68246"
},
{
"name": "CVE-2025-68339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68339"
},
{
"name": "CVE-2025-40287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40287"
},
{
"name": "CVE-2023-53320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53320"
},
{
"name": "CVE-2024-44961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44961"
},
{
"name": "CVE-2026-23069",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23069"
},
{
"name": "CVE-2025-21656",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21656"
},
{
"name": "CVE-2024-46835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46835"
},
{
"name": "CVE-2025-69650",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69650"
},
{
"name": "CVE-2022-50554",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50554"
},
{
"name": "CVE-2023-53509",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53509"
},
{
"name": "CVE-2023-53421",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53421"
},
{
"name": "CVE-2025-11731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11731"
},
{
"name": "CVE-2026-22992",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22992"
},
{
"name": "CVE-2024-52005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52005"
},
{
"name": "CVE-2024-46775",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46775"
},
{
"name": "CVE-2025-39764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39764"
},
{
"name": "CVE-2025-38207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38207"
},
{
"name": "CVE-2022-49465",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49465"
},
{
"name": "CVE-2026-23004",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23004"
},
{
"name": "CVE-2024-26807",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26807"
},
{
"name": "CVE-2025-39720",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39720"
},
{
"name": "CVE-2023-54271",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54271"
},
{
"name": "CVE-2022-49742",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49742"
},
{
"name": "CVE-2025-71191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71191"
},
{
"name": "CVE-2025-68295",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68295"
},
{
"name": "CVE-2025-68728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68728"
},
{
"name": "CVE-2025-40780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40780"
},
{
"name": "CVE-2025-68364",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68364"
},
{
"name": "CVE-2024-42118",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42118"
},
{
"name": "CVE-2025-40100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40100"
},
{
"name": "CVE-2026-1965",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1965"
},
{
"name": "CVE-2024-52560",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52560"
},
{
"name": "CVE-2024-56604",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56604"
},
{
"name": "CVE-2026-23227",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23227"
},
{
"name": "CVE-2025-71087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71087"
},
{
"name": "CVE-2023-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
},
{
"name": "CVE-2023-52653",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52653"
},
{
"name": "CVE-2025-40285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40285"
},
{
"name": "CVE-2023-52508",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52508"
},
{
"name": "CVE-2025-69647",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69647"
},
{
"name": "CVE-2025-39827",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39827"
},
{
"name": "CVE-2024-50014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50014"
},
{
"name": "CVE-2022-49108",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49108"
},
{
"name": "CVE-2024-56677",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56677"
},
{
"name": "CVE-2025-38717",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38717"
},
{
"name": "CVE-2026-3497",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3497"
},
{
"name": "CVE-2025-22019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22019"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2025-40208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40208"
},
{
"name": "CVE-2025-39746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39746"
},
{
"name": "CVE-2024-26767",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26767"
},
{
"name": "CVE-2025-21872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21872"
},
{
"name": "CVE-2026-2219",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2219"
},
{
"name": "CVE-2025-68287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68287"
},
{
"name": "CVE-2025-40039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40039"
},
{
"name": "CVE-2025-38208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38208"
},
{
"name": "CVE-2024-35926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35926"
},
{
"name": "CVE-2024-27389",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27389"
},
{
"name": "CVE-2024-26983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26983"
},
{
"name": "CVE-2022-50627",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50627"
},
{
"name": "CVE-2024-50285",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50285"
},
{
"name": "CVE-2025-38099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38099"
},
{
"name": "CVE-2025-38524",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38524"
},
{
"name": "CVE-2025-38029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38029"
},
{
"name": "CVE-2022-49123",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49123"
},
{
"name": "CVE-2024-50289",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50289"
},
{
"name": "CVE-2023-53258",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53258"
},
{
"name": "CVE-2024-46813",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46813"
},
{
"name": "CVE-2024-38594",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38594"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2024-47658",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47658"
},
{
"name": "CVE-2022-41409",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41409"
},
{
"name": "CVE-2025-38096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38096"
},
{
"name": "CVE-2024-48873",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-48873"
},
{
"name": "CVE-2025-68746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68746"
},
{
"name": "CVE-2023-53429",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53429"
},
{
"name": "CVE-2024-46765",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46765"
},
{
"name": "CVE-2022-50380",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50380"
},
{
"name": "CVE-2025-38039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38039"
},
{
"name": "CVE-2022-48990",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48990"
},
{
"name": "CVE-2024-24864",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24864"
},
{
"name": "CVE-2024-35832",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35832"
},
{
"name": "CVE-2024-36479",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36479"
},
{
"name": "CVE-2025-71133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71133"
},
{
"name": "CVE-2026-23220",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23220"
},
{
"name": "CVE-2024-45782",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45782"
},
{
"name": "CVE-2022-50785",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50785"
},
{
"name": "CVE-2025-39745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39745"
},
{
"name": "CVE-2024-35799",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35799"
},
{
"name": "CVE-2025-40103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40103"
},
{
"name": "CVE-2026-23020",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23020"
},
{
"name": "CVE-2025-38595",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38595"
},
{
"name": "CVE-2025-71223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71223"
},
{
"name": "CVE-2025-36098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36098"
},
{
"name": "CVE-2025-68796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68796"
},
{
"name": "CVE-2025-40016",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40016"
},
{
"name": "CVE-2023-53765",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53765"
},
{
"name": "CVE-2025-38626",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38626"
},
{
"name": "CVE-2025-40356",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40356"
},
{
"name": "CVE-2026-1642",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1642"
},
{
"name": "CVE-2025-45582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45582"
},
{
"name": "CVE-2023-53325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53325"
},
{
"name": "CVE-2025-21752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21752"
},
{
"name": "CVE-2026-27138",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27138"
},
{
"name": "CVE-2025-40312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40312"
},
{
"name": "CVE-2025-37852",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37852"
},
{
"name": "CVE-2025-68220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68220"
},
{
"name": "CVE-2025-22125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22125"
},
{
"name": "CVE-2019-6293",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6293"
},
{
"name": "CVE-2024-26953",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26953"
},
{
"name": "CVE-2024-39282",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39282"
},
{
"name": "CVE-2025-21738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21738"
},
{
"name": "CVE-2023-50868",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50868"
},
{
"name": "CVE-2025-68302",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68302"
},
{
"name": "CVE-2024-50146",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50146"
},
{
"name": "CVE-2025-68238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68238"
},
{
"name": "CVE-2024-56709",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56709"
},
{
"name": "CVE-2025-38063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38063"
},
{
"name": "CVE-2025-68297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68297"
},
{
"name": "CVE-2024-40975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40975"
},
{
"name": "CVE-2025-68175",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68175"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2023-54227",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54227"
},
{
"name": "CVE-2023-46316",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46316"
},
{
"name": "CVE-2024-47866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47866"
},
{
"name": "CVE-2024-44970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44970"
},
{
"name": "CVE-2022-49476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49476"
},
{
"name": "CVE-2023-53855",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53855"
},
{
"name": "CVE-2026-23208",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23208"
},
{
"name": "CVE-2025-68804",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68804"
},
{
"name": "CVE-2025-39925",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39925"
},
{
"name": "CVE-2025-68769",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68769"
},
{
"name": "CVE-2024-50286",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50286"
},
{
"name": "CVE-2025-40139",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40139"
},
{
"name": "CVE-2025-68794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68794"
},
{
"name": "CVE-2025-21768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21768"
},
{
"name": "CVE-2022-48667",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48667"
},
{
"name": "CVE-2025-69419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69419"
},
{
"name": "CVE-2024-56744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56744"
},
{
"name": "CVE-2025-38491",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38491"
},
{
"name": "CVE-2026-3783",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3783"
},
{
"name": "CVE-2022-49161",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49161"
},
{
"name": "CVE-2021-21240",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21240"
},
{
"name": "CVE-2022-48771",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48771"
},
{
"name": "CVE-2025-37961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37961"
},
{
"name": "CVE-2025-23131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23131"
},
{
"name": "CVE-2024-27400",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27400"
},
{
"name": "CVE-2023-52485",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52485"
},
{
"name": "CVE-2025-40309",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40309"
},
{
"name": "CVE-2022-49997",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49997"
},
{
"name": "CVE-2022-49469",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49469"
},
{
"name": "CVE-2025-38408",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38408"
},
{
"name": "CVE-2026-23179",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23179"
},
{
"name": "CVE-2025-68334",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68334"
},
{
"name": "CVE-2025-40343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40343"
},
{
"name": "CVE-2025-38644",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38644"
},
{
"name": "CVE-2025-38692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38692"
},
{
"name": "CVE-2022-0480",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0480"
},
{
"name": "CVE-2025-68173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68173"
},
{
"name": "CVE-2024-49932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49932"
},
{
"name": "CVE-2026-23090",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23090"
},
{
"name": "CVE-2026-23035",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23035"
},
{
"name": "CVE-2023-53209",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53209"
},
{
"name": "CVE-2023-54253",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54253"
},
{
"name": "CVE-2025-38127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38127"
},
{
"name": "CVE-2025-22103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22103"
},
{
"name": "CVE-2025-1272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1272"
},
{
"name": "CVE-2025-21658",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21658"
},
{
"name": "CVE-2022-49651",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49651"
},
{
"name": "CVE-2025-68307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68307"
},
{
"name": "CVE-2025-40308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40308"
},
{
"name": "CVE-2024-26770",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26770"
},
{
"name": "CVE-2023-54324",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54324"
},
{
"name": "CVE-2024-27041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27041"
},
{
"name": "CVE-2025-36184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36184"
},
{
"name": "CVE-2026-3195",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3195"
},
{
"name": "CVE-2025-37743",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37743"
},
{
"name": "CVE-2025-40005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40005"
},
{
"name": "CVE-2025-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37920"
},
{
"name": "CVE-2024-56326",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56326"
},
{
"name": "CVE-2023-26242",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26242"
},
{
"name": "CVE-2025-58185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58185"
},
{
"name": "CVE-2025-40315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40315"
},
{
"name": "CVE-2023-52673",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52673"
},
{
"name": "CVE-2024-56722",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56722"
},
{
"name": "CVE-2021-33113",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33113"
},
{
"name": "CVE-2022-48668",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48668"
},
{
"name": "CVE-2024-27418",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27418"
},
{
"name": "CVE-2025-68231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68231"
},
{
"name": "CVE-2021-22930",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22930"
},
{
"name": "CVE-2026-23064",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23064"
},
{
"name": "CVE-2025-38591",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38591"
},
{
"name": "CVE-2025-68806",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68806"
},
{
"name": "CVE-2022-50322",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50322"
},
{
"name": "CVE-2023-50782",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50782"
},
{
"name": "CVE-2022-27635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27635"
},
{
"name": "CVE-2025-71098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71098"
},
{
"name": "CVE-2024-49922",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49922"
},
{
"name": "CVE-2020-12317",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12317"
},
{
"name": "CVE-2025-61731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61731"
},
{
"name": "CVE-2025-40251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40251"
},
{
"name": "CVE-2024-42128",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42128"
},
{
"name": "CVE-2025-71078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71078"
},
{
"name": "CVE-2024-49909",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49909"
},
{
"name": "CVE-2025-40355",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40355"
},
{
"name": "CVE-2021-42771",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42771"
},
{
"name": "CVE-2021-4095",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4095"
},
{
"name": "CVE-2022-50240",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50240"
},
{
"name": "CVE-2025-40054",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40054"
},
{
"name": "CVE-2024-45015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45015"
},
{
"name": "CVE-2025-68184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68184"
},
{
"name": "CVE-2024-36357",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36357"
},
{
"name": "CVE-2025-71074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71074"
},
{
"name": "CVE-2025-38673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38673"
},
{
"name": "CVE-2025-40107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40107"
},
{
"name": "CVE-2025-11234",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11234"
},
{
"name": "CVE-2025-71083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71083"
},
{
"name": "CVE-2026-23061",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23061"
},
{
"name": "CVE-2023-53447",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53447"
},
{
"name": "CVE-2024-46754",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46754"
},
{
"name": "CVE-2021-0161",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0161"
},
{
"name": "CVE-2018-1121",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1121"
},
{
"name": "CVE-2022-49547",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49547"
},
{
"name": "CVE-2025-66863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66863"
},
{
"name": "CVE-2025-0622",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0622"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2024-26757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26757"
},
{
"name": "CVE-2024-49899",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49899"
},
{
"name": "CVE-2022-49484",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49484"
},
{
"name": "CVE-2024-40900",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40900"
},
{
"name": "CVE-2024-46748",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46748"
},
{
"name": "CVE-2025-68813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68813"
},
{
"name": "CVE-2024-50164",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50164"
},
{
"name": "CVE-2026-27137",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27137"
},
{
"name": "CVE-2023-53248",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53248"
},
{
"name": "CVE-2024-56788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56788"
},
{
"name": "CVE-2016-8660",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8660"
},
{
"name": "CVE-2024-26691",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26691"
},
{
"name": "CVE-2026-23047",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23047"
},
{
"name": "CVE-2025-22121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22121"
},
{
"name": "CVE-2024-1975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1975"
},
{
"name": "CVE-2025-38215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38215"
},
{
"name": "CVE-2025-7519",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7519"
},
{
"name": "CVE-2023-53491",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53491"
},
{
"name": "CVE-2025-68365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68365"
},
{
"name": "CVE-2024-57804",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57804"
},
{
"name": "CVE-2024-49908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49908"
},
{
"name": "CVE-2025-68265",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68265"
},
{
"name": "CVE-2024-50048",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50048"
},
{
"name": "CVE-2026-28421",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28421"
},
{
"name": "CVE-2026-23119",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23119"
},
{
"name": "CVE-2025-37943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37943"
},
{
"name": "CVE-2025-21918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21918"
},
{
"name": "CVE-2025-37745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37745"
},
{
"name": "CVE-2025-71085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71085"
},
{
"name": "CVE-2026-27171",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27171"
},
{
"name": "CVE-2022-50811",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50811"
},
{
"name": "CVE-2023-4133",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4133"
},
{
"name": "CVE-2024-50183",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50183"
},
{
"name": "CVE-2025-38734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38734"
},
{
"name": "CVE-2023-53366",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53366"
},
{
"name": "CVE-2022-49910",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49910"
},
{
"name": "CVE-2024-27062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27062"
},
{
"name": "CVE-2022-49203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49203"
},
{
"name": "CVE-2024-40918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40918"
},
{
"name": "CVE-2024-27032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27032"
},
{
"name": "CVE-2022-50236",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50236"
},
{
"name": "CVE-2024-35932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35932"
},
{
"name": "CVE-2024-35839",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35839"
},
{
"name": "CVE-2025-68344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68344"
},
{
"name": "CVE-2026-23137",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23137"
},
{
"name": "CVE-2025-40347",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40347"
},
{
"name": "CVE-2025-71154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71154"
},
{
"name": "CVE-2025-37882",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37882"
},
{
"name": "CVE-2024-35971",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35971"
},
{
"name": "CVE-2024-46762",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46762"
},
{
"name": "CVE-2023-34983",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34983"
},
{
"name": "CVE-2024-35868",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35868"
},
{
"name": "CVE-2023-53323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53323"
},
{
"name": "CVE-2026-3731",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3731"
},
{
"name": "CVE-2025-40198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40198"
},
{
"name": "CVE-2024-0760",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0760"
},
{
"name": "CVE-2025-39942",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39942"
},
{
"name": "CVE-2025-68310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68310"
},
{
"name": "CVE-2026-23222",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23222"
},
{
"name": "CVE-2025-68229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68229"
},
{
"name": "CVE-2023-52857",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52857"
},
{
"name": "CVE-2024-42107",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42107"
},
{
"name": "CVE-2025-68257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68257"
},
{
"name": "CVE-2025-39929",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39929"
},
{
"name": "CVE-2022-50304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50304"
},
{
"name": "CVE-2026-23226",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23226"
},
{
"name": "CVE-2020-26146",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26146"
},
{
"name": "CVE-2024-43844",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43844"
},
{
"name": "CVE-2023-52920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52920"
},
{
"name": "CVE-2023-52590",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52590"
},
{
"name": "CVE-2025-71084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71084"
},
{
"name": "CVE-2024-22025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22025"
},
{
"name": "CVE-2026-23049",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23049"
},
{
"name": "CVE-2025-68321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68321"
},
{
"name": "CVE-2021-0072",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0072"
},
{
"name": "CVE-2025-40190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40190"
},
{
"name": "CVE-2025-69652",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69652"
},
{
"name": "CVE-2025-21635",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21635"
},
{
"name": "CVE-2025-37924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37924"
},
{
"name": "CVE-2022-40133",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40133"
},
{
"name": "CVE-2020-26143",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26143"
},
{
"name": "CVE-2025-21712",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21712"
},
{
"name": "CVE-2025-38353",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38353"
},
{
"name": "CVE-2025-36009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36009"
},
{
"name": "CVE-2019-0154",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0154"
},
{
"name": "CVE-2024-57982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57982"
},
{
"name": "CVE-2023-52761",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52761"
},
{
"name": "CVE-2022-49773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49773"
},
{
"name": "CVE-2023-53609",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53609"
},
{
"name": "CVE-2023-53478",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53478"
},
{
"name": "CVE-2024-42117",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42117"
},
{
"name": "CVE-2025-23160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23160"
},
{
"name": "CVE-2023-53682",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53682"
},
{
"name": "CVE-2026-23229",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23229"
},
{
"name": "CVE-2025-40311",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40311"
},
{
"name": "CVE-2025-54770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54770"
},
{
"name": "CVE-2026-3442",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3442"
},
{
"name": "CVE-2024-58238",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58238"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2025-68814",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68814"
},
{
"name": "CVE-2025-22039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22039"
},
{
"name": "CVE-2025-37842",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37842"
},
{
"name": "CVE-2025-39933",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39933"
},
{
"name": "CVE-2025-40237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40237"
},
{
"name": "CVE-2025-47908",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47908"
},
{
"name": "CVE-2022-49722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49722"
},
{
"name": "CVE-2026-23745",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23745"
},
{
"name": "CVE-2025-68780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68780"
},
{
"name": "CVE-2024-35945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35945"
},
{
"name": "CVE-2025-39990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39990"
},
{
"name": "CVE-2025-15467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15467"
},
{
"name": "CVE-2025-71081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71081"
},
{
"name": "CVE-2023-53780",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53780"
},
{
"name": "CVE-2020-35501",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35501"
},
{
"name": "CVE-2024-58251",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58251"
},
{
"name": "CVE-2025-38710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38710"
},
{
"name": "CVE-2025-9820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9820"
},
{
"name": "CVE-2023-52624",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52624"
},
{
"name": "CVE-2024-56557",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56557"
},
{
"name": "CVE-2022-49699",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49699"
},
{
"name": "CVE-2022-50700",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50700"
},
{
"name": "CVE-2023-52632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52632"
},
{
"name": "CVE-2024-46836",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46836"
},
{
"name": "CVE-2026-23101",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23101"
},
{
"name": "CVE-2026-23099",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23099"
},
{
"name": "CVE-2024-38556",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38556"
},
{
"name": "CVE-2025-1180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1180"
},
{
"name": "CVE-2025-38060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38060"
},
{
"name": "CVE-2022-48929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48929"
},
{
"name": "CVE-2025-55130",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55130"
},
{
"name": "CVE-2025-36070",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36070"
},
{
"name": "CVE-2024-46820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46820"
},
{
"name": "CVE-2025-39770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39770"
},
{
"name": "CVE-2025-38105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38105"
},
{
"name": "CVE-2025-37744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37744"
},
{
"name": "CVE-2025-38705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38705"
},
{
"name": "CVE-2023-53198",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53198"
},
{
"name": "CVE-2023-53846",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53846"
},
{
"name": "CVE-2025-71121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71121"
},
{
"name": "CVE-2024-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35942"
},
{
"name": "CVE-2022-1247",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1247"
},
{
"name": "CVE-2025-40333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40333"
},
{
"name": "CVE-2022-50234",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50234"
},
{
"name": "CVE-2025-38082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38082"
},
{
"name": "CVE-2025-37884",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37884"
},
{
"name": "CVE-2024-58054",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58054"
},
{
"name": "CVE-2024-49934",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49934"
},
{
"name": "CVE-2025-39750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39750"
},
{
"name": "CVE-2025-38022",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38022"
},
{
"name": "CVE-2026-23066",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23066"
},
{
"name": "CVE-2025-38562",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38562"
},
{
"name": "CVE-2023-4969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4969"
},
{
"name": "CVE-2024-50098",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50098"
},
{
"name": "CVE-2024-35946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35946"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2023-53789",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53789"
},
{
"name": "CVE-2022-49858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49858"
},
{
"name": "CVE-2025-39692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39692"
},
{
"name": "CVE-2024-35959",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35959"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2025-36428",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36428"
},
{
"name": "CVE-2023-53520",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53520"
},
{
"name": "CVE-2026-23085",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23085"
},
{
"name": "CVE-2023-52737",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52737"
},
{
"name": "CVE-2025-40360",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40360"
},
{
"name": "CVE-2026-23209",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23209"
},
{
"name": "CVE-2025-71136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71136"
},
{
"name": "CVE-2024-35803",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35803"
},
{
"name": "CVE-2025-22105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22105"
},
{
"name": "CVE-2024-8612",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8612"
},
{
"name": "CVE-2023-52586",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52586"
},
{
"name": "CVE-2025-40332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40332"
},
{
"name": "CVE-2021-46195",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46195"
},
{
"name": "CVE-2025-68354",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68354"
},
{
"name": "CVE-2025-68801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68801"
},
{
"name": "CVE-2021-33110",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33110"
},
{
"name": "CVE-2025-37834",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37834"
},
{
"name": "CVE-2025-21833",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21833"
},
{
"name": "CVE-2025-40082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40082"
},
{
"name": "CVE-2019-19378",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19378"
},
{
"name": "CVE-2026-23150",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23150"
},
{
"name": "CVE-2024-40972",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40972"
},
{
"name": "CVE-2025-61985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61985"
},
{
"name": "CVE-2025-71073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71073"
},
{
"name": "CVE-2025-38426",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38426"
},
{
"name": "CVE-2025-38436",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38436"
},
{
"name": "CVE-2024-36911",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36911"
},
{
"name": "CVE-2025-55131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55131"
},
{
"name": "CVE-2025-40104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40104"
},
{
"name": "CVE-2024-36917",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36917"
},
{
"name": "CVE-2025-38097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38097"
},
{
"name": "CVE-2026-23236",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23236"
},
{
"name": "CVE-2023-53068",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53068"
},
{
"name": "CVE-2025-22090",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22090"
},
{
"name": "CVE-2021-31615",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31615"
},
{
"name": "CVE-2024-1737",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1737"
},
{
"name": "CVE-2025-40097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40097"
},
{
"name": "CVE-2022-49932",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49932"
},
{
"name": "CVE-2022-25837",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25837"
},
{
"name": "CVE-2025-68258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68258"
},
{
"name": "CVE-2024-49939",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49939"
},
{
"name": "CVE-2025-38239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38239"
},
{
"name": "CVE-2024-49905",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49905"
},
{
"name": "CVE-2023-52831",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52831"
},
{
"name": "CVE-2023-53221",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53221"
},
{
"name": "CVE-2024-26719",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26719"
},
{
"name": "CVE-2022-44034",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44034"
},
{
"name": "CVE-2022-40897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
},
{
"name": "CVE-2023-53072",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53072"
},
{
"name": "CVE-2023-2007",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2007"
},
{
"name": "CVE-2022-37341",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37341"
},
{
"name": "CVE-2025-69648",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69648"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2024-50298",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50298"
},
{
"name": "CVE-2025-36424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36424"
},
{
"name": "CVE-2025-21915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21915"
},
{
"name": "CVE-2025-38590",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38590"
},
{
"name": "CVE-2024-46843",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46843"
},
{
"name": "CVE-2025-21792",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21792"
},
{
"name": "CVE-2023-54016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54016"
},
{
"name": "CVE-2025-36387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36387"
},
{
"name": "CVE-2025-38709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38709"
},
{
"name": "CVE-2024-58018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58018"
},
{
"name": "CVE-2023-4408",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4408"
},
{
"name": "CVE-2025-71235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71235"
},
{
"name": "CVE-2023-53602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53602"
},
{
"name": "CVE-2023-2828",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2828"
},
{
"name": "CVE-2023-54035",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54035"
},
{
"name": "CVE-2025-40322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40322"
},
{
"name": "CVE-2023-53867",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53867"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2025-37926",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37926"
},
{
"name": "CVE-2024-46715",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46715"
},
{
"name": "CVE-2025-38038",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38038"
},
{
"name": "CVE-2024-46802",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46802"
},
{
"name": "CVE-2025-39859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39859"
},
{
"name": "CVE-2025-40313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40313"
},
{
"name": "CVE-2023-52582",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52582"
},
{
"name": "CVE-2023-33053",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33053"
},
{
"name": "CVE-2025-1152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1152"
},
{
"name": "CVE-2026-24051",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24051"
},
{
"name": "CVE-2025-38015",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38015"
},
{
"name": "CVE-2024-26742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26742"
},
{
"name": "CVE-2025-38449",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38449"
},
{
"name": "CVE-2025-21714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21714"
},
{
"name": "CVE-2025-38261",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38261"
},
{
"name": "CVE-2024-36918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36918"
},
{
"name": "CVE-2025-37853",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37853"
},
{
"name": "CVE-2025-69644",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69644"
},
{
"name": "CVE-2022-49303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49303"
},
{
"name": "CVE-2025-38126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38126"
},
{
"name": "CVE-2023-46809",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46809"
},
{
"name": "CVE-2025-59465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59465"
},
{
"name": "CVE-2025-39763",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39763"
},
{
"name": "CVE-2025-21972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21972"
},
{
"name": "CVE-2023-54088",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54088"
},
{
"name": "CVE-2024-42320",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42320"
},
{
"name": "CVE-2025-38679",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38679"
},
{
"name": "CVE-2025-40271",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40271"
},
{
"name": "CVE-2024-53234",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53234"
},
{
"name": "CVE-2025-11961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11961"
},
{
"name": "CVE-2025-39877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39877"
},
{
"name": "CVE-2022-3114",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3114"
},
{
"name": "CVE-2023-52916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52916"
},
{
"name": "CVE-2025-38064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38064"
},
{
"name": "CVE-2026-22991",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22991"
},
{
"name": "CVE-2024-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35937"
},
{
"name": "CVE-2022-50628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50628"
},
{
"name": "CVE-2024-56718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56718"
},
{
"name": "CVE-2024-43824",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43824"
},
{
"name": "CVE-2025-39886",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39886"
},
{
"name": "CVE-2022-50350",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50350"
},
{
"name": "CVE-2025-21831",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21831"
},
{
"name": "CVE-2022-50721",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50721"
},
{
"name": "CVE-2022-50095",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50095"
},
{
"name": "CVE-2025-40073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40073"
},
{
"name": "CVE-2024-26662",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26662"
},
{
"name": "CVE-2026-3196",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3196"
},
{
"name": "CVE-2025-61662",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61662"
},
{
"name": "CVE-2025-68308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68308"
},
{
"name": "CVE-2024-50217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50217"
},
{
"name": "CVE-2021-0168",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0168"
},
{
"name": "CVE-2026-22795",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22795"
},
{
"name": "CVE-2022-50479",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50479"
},
{
"name": "CVE-2022-50583",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50583"
},
{
"name": "CVE-2025-37806",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37806"
},
{
"name": "CVE-2024-38554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38554"
},
{
"name": "CVE-2025-68822",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68822"
},
{
"name": "CVE-2025-40242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40242"
},
{
"name": "CVE-2023-0030",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0030"
},
{
"name": "CVE-2024-42110",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42110"
},
{
"name": "CVE-2025-37822",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37822"
},
{
"name": "CVE-2025-61727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61727"
},
{
"name": "CVE-2025-39838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39838"
},
{
"name": "CVE-2025-37820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37820"
},
{
"name": "CVE-2024-53179",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53179"
},
{
"name": "CVE-2024-57945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57945"
},
{
"name": "CVE-2023-54233",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54233"
},
{
"name": "CVE-2024-43899",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43899"
},
{
"name": "CVE-2025-21986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21986"
},
{
"name": "CVE-2019-15213",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15213"
},
{
"name": "CVE-2025-38234",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38234"
},
{
"name": "CVE-2022-49935",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49935"
},
{
"name": "CVE-2021-44532",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44532"
},
{
"name": "CVE-2025-38011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38011"
},
{
"name": "CVE-2022-49534",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49534"
},
{
"name": "CVE-2024-57974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57974"
},
{
"name": "CVE-2024-50012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50012"
},
{
"name": "CVE-2025-68190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68190"
},
{
"name": "CVE-2023-53010",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53010"
},
{
"name": "CVE-2024-35956",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35956"
},
{
"name": "CVE-2024-57888",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57888"
},
{
"name": "CVE-2024-35908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35908"
},
{
"name": "CVE-2023-54237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54237"
},
{
"name": "CVE-2025-37878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37878"
},
{
"name": "CVE-2023-53424",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53424"
},
{
"name": "CVE-2026-23207",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23207"
},
{
"name": "CVE-2025-40252",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40252"
},
{
"name": "CVE-2022-49134",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49134"
},
{
"name": "CVE-2025-21946",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21946"
},
{
"name": "CVE-2025-21838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21838"
},
{
"name": "CVE-2022-49333",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49333"
},
{
"name": "CVE-2023-53791",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53791"
},
{
"name": "CVE-2024-49994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49994"
},
{
"name": "CVE-2025-53859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53859"
},
{
"name": "CVE-2019-19814",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19814"
},
{
"name": "CVE-2022-49136",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49136"
},
{
"name": "CVE-2025-68255",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68255"
},
{
"name": "CVE-2025-47910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47910"
},
{
"name": "CVE-2023-54081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54081"
},
{
"name": "CVE-2024-36898",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36898"
},
{
"name": "CVE-2024-44962",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44962"
},
{
"name": "CVE-2025-68322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68322"
},
{
"name": "CVE-2024-35931",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35931"
},
{
"name": "CVE-2025-38702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38702"
},
{
"name": "CVE-2026-22980",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22980"
},
{
"name": "CVE-2026-23138",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23138"
},
{
"name": "CVE-2025-39927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39927"
},
{
"name": "CVE-2023-26551",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26551"
},
{
"name": "CVE-2024-46857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46857"
},
{
"name": "CVE-2024-58013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58013"
},
{
"name": "CVE-2024-53210",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53210"
},
{
"name": "CVE-2023-54185",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54185"
},
{
"name": "CVE-2022-49342",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49342"
},
{
"name": "CVE-2015-8553",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8553"
},
{
"name": "CVE-2025-40277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40277"
},
{
"name": "CVE-2025-38250",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38250"
},
{
"name": "CVE-2024-36966",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36966"
},
{
"name": "CVE-2023-53332",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53332"
},
{
"name": "CVE-2024-35924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35924"
},
{
"name": "CVE-2024-58095",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58095"
},
{
"name": "CVE-2024-45010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45010"
},
{
"name": "CVE-2022-49471",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49471"
},
{
"name": "CVE-2025-68174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68174"
},
{
"name": "CVE-2022-48976",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48976"
},
{
"name": "CVE-2025-21751",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21751"
},
{
"name": "CVE-2023-53753",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53753"
},
{
"name": "CVE-2024-41074",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41074"
},
{
"name": "CVE-2026-23234",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23234"
},
{
"name": "CVE-2025-40272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40272"
},
{
"name": "CVE-2024-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50106"
},
{
"name": "CVE-2025-23162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23162"
},
{
"name": "CVE-2026-23133",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23133"
},
{
"name": "CVE-2025-71093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71093"
},
{
"name": "CVE-2017-13694",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13694"
},
{
"name": "CVE-2025-71102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71102"
},
{
"name": "CVE-2026-23212",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23212"
},
{
"name": "CVE-2013-7445",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-7445"
},
{
"name": "CVE-2026-23170",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23170"
},
{
"name": "CVE-2023-52701",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52701"
},
{
"name": "CVE-2024-49906",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49906"
},
{
"name": "CVE-2024-26647",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26647"
},
{
"name": "CVE-2025-68759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68759"
},
{
"name": "CVE-2024-47809",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47809"
},
{
"name": "CVE-2026-23204",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23204"
},
{
"name": "CVE-2022-49317",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49317"
},
{
"name": "CVE-2026-23019",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23019"
},
{
"name": "CVE-2018-12928",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12928"
},
{
"name": "CVE-2025-71188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71188"
},
{
"name": "CVE-2023-38552",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38552"
},
{
"name": "CVE-2024-40989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40989"
},
{
"name": "CVE-2024-56607",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56607"
},
{
"name": "CVE-2025-40345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40345"
},
{
"name": "CVE-2026-27142",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27142"
},
{
"name": "CVE-2024-49904",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49904"
},
{
"name": "CVE-2023-53671",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53671"
},
{
"name": "CVE-2025-40354",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40354"
},
{
"name": "CVE-2024-26938",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26938"
},
{
"name": "CVE-2026-28417",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28417"
},
{
"name": "CVE-2025-37931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37931"
},
{
"name": "CVE-2024-35999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35999"
},
{
"name": "CVE-2023-29942",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29942"
},
{
"name": "CVE-2026-23125",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23125"
},
{
"name": "CVE-2026-0966",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0966"
},
{
"name": "CVE-2022-48633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48633"
},
{
"name": "CVE-2022-3238",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3238"
},
{
"name": "CVE-2024-38557",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38557"
},
{
"name": "CVE-2026-22185",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22185"
},
{
"name": "CVE-2023-53781",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53781"
},
{
"name": "CVE-2023-53584",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53584"
},
{
"name": "CVE-2024-57809",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57809"
},
{
"name": "CVE-2025-38057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38057"
},
{
"name": "CVE-2025-68733",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68733"
},
{
"name": "CVE-2024-56719",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56719"
},
{
"name": "CVE-2022-50418",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50418"
},
{
"name": "CVE-2023-53438",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53438"
},
{
"name": "CVE-2025-47906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47906"
},
{
"name": "CVE-2023-53460",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53460"
},
{
"name": "CVE-2026-23214",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23214"
},
{
"name": "CVE-2024-52559",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52559"
},
{
"name": "CVE-2025-68188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68188"
},
{
"name": "CVE-2025-40269",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40269"
},
{
"name": "CVE-2024-56671",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56671"
},
{
"name": "CVE-2025-68335",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68335"
},
{
"name": "CVE-2025-71079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71079"
},
{
"name": "CVE-2025-62626",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62626"
},
{
"name": "CVE-2025-39940",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39940"
},
{
"name": "CVE-2023-52751",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52751"
},
{
"name": "CVE-2022-49562",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49562"
},
{
"name": "CVE-2025-37861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37861"
},
{
"name": "CVE-2023-53483",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53483"
},
{
"name": "CVE-2023-53673",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53673"
},
{
"name": "CVE-2025-37938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37938"
},
{
"name": "CVE-2025-37746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37746"
},
{
"name": "CVE-2022-38076",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38076"
},
{
"name": "CVE-2025-38368",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38368"
},
{
"name": "CVE-2026-23178",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23178"
},
{
"name": "CVE-2025-59375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59375"
},
{
"name": "CVE-2025-31133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31133"
},
{
"name": "CVE-2026-22997",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22997"
},
{
"name": "CVE-2024-56368",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56368"
},
{
"name": "CVE-2025-40075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40075"
},
{
"name": "CVE-2022-49172",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49172"
},
{
"name": "CVE-2024-40979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40979"
},
{
"name": "CVE-2025-39977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39977"
},
{
"name": "CVE-2025-38331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38331"
},
{
"name": "CVE-2026-23240",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23240"
},
{
"name": "CVE-2025-68330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68330"
},
{
"name": "CVE-2026-23228",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23228"
},
{
"name": "CVE-2024-49945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49945"
},
{
"name": "CVE-2022-44033",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44033"
},
{
"name": "CVE-2024-56757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56757"
},
{
"name": "CVE-2023-53662",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53662"
},
{
"name": "CVE-2025-38069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38069"
},
{
"name": "CVE-2022-49750",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49750"
},
{
"name": "CVE-2023-53707",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53707"
},
{
"name": "CVE-2023-53115",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53115"
},
{
"name": "CVE-2025-71196",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71196"
},
{
"name": "CVE-2025-21645",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21645"
},
{
"name": "CVE-2023-54107",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54107"
},
{
"name": "CVE-2022-48646",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48646"
},
{
"name": "CVE-2024-43912",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43912"
},
{
"name": "CVE-2024-35808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35808"
},
{
"name": "CVE-2024-58012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58012"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2025-61663",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61663"
},
{
"name": "CVE-2025-68772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68772"
},
{
"name": "CVE-2024-49891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49891"
},
{
"name": "CVE-2024-36948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36948"
},
{
"name": "CVE-2022-48887",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48887"
},
{
"name": "CVE-2024-40977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40977"
},
{
"name": "CVE-2024-26948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26948"
},
{
"name": "CVE-2023-53370",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53370"
},
{
"name": "CVE-2024-53187",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53187"
},
{
"name": "CVE-2023-45929",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45929"
},
{
"name": "CVE-2025-68343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68343"
},
{
"name": "CVE-2025-66382",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66382"
},
{
"name": "CVE-2024-57795",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57795"
},
{
"name": "CVE-2025-37855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37855"
},
{
"name": "CVE-2025-21816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21816"
},
{
"name": "CVE-2021-33115",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33115"
},
{
"name": "CVE-2025-21780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21780"
},
{
"name": "CVE-2020-26559",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26559"
},
{
"name": "CVE-2024-12705",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12705"
},
{
"name": "CVE-2025-69421",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69421"
},
{
"name": "CVE-2020-26140",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26140"
},
{
"name": "CVE-2024-39508",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39508"
},
{
"name": "CVE-2026-23191",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23191"
},
{
"name": "CVE-2026-32249",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32249"
},
{
"name": "CVE-2025-37899",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37899"
},
{
"name": "CVE-2026-23078",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23078"
},
{
"name": "CVE-2025-40362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40362"
},
{
"name": "CVE-2025-68201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68201"
},
{
"name": "CVE-2024-43831",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43831"
},
{
"name": "CVE-2023-30630",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30630"
},
{
"name": "CVE-2025-40289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40289"
},
{
"name": "CVE-2026-23169",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23169"
},
{
"name": "CVE-2025-38330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38330"
},
{
"name": "CVE-2025-58188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58188"
},
{
"name": "CVE-2017-13693",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13693"
},
{
"name": "CVE-2025-68768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68768"
},
{
"name": "CVE-2024-50284",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50284"
},
{
"name": "CVE-2022-49306",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49306"
},
{
"name": "CVE-2024-49898",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49898"
},
{
"name": "CVE-2025-36423",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36423"
},
{
"name": "CVE-2022-49622",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49622"
},
{
"name": "CVE-2025-68785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68785"
},
{
"name": "CVE-2024-50211",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50211"
},
{
"name": "CVE-2025-38507",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38507"
},
{
"name": "CVE-2022-50284",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50284"
},
{
"name": "CVE-2025-39989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39989"
},
{
"name": "CVE-2023-6240",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6240"
},
{
"name": "CVE-2025-38014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38014"
},
{
"name": "CVE-2025-22028",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22028"
},
{
"name": "CVE-2024-41008",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41008"
},
{
"name": "CVE-2024-27035",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27035"
},
{
"name": "CVE-2023-53218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53218"
},
{
"name": "CVE-2022-25836",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25836"
},
{
"name": "CVE-2024-37354",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37354"
},
{
"name": "CVE-2025-68808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68808"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2025-29934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29934"
},
{
"name": "CVE-2024-27005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27005"
},
{
"name": "CVE-2025-68223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68223"
},
{
"name": "CVE-2022-49133",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49133"
},
{
"name": "CVE-2024-36951",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36951"
},
{
"name": "CVE-2025-68783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68783"
},
{
"name": "CVE-2025-71147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71147"
},
{
"name": "CVE-2025-38438",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38438"
},
{
"name": "CVE-2025-40032",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40032"
},
{
"name": "CVE-2023-26555",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26555"
},
{
"name": "CVE-2023-1193",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1193"
},
{
"name": "CVE-2025-71220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71220"
},
{
"name": "CVE-2024-46806",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46806"
},
{
"name": "CVE-2022-50073",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50073"
},
{
"name": "CVE-2025-68724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68724"
},
{
"name": "CVE-2025-5278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5278"
},
{
"name": "CVE-2026-23103",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23103"
},
{
"name": "CVE-2026-23074",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23074"
},
{
"name": "CVE-2025-68786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68786"
},
{
"name": "CVE-2025-39732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39732"
},
{
"name": "CVE-2022-50393",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50393"
},
{
"name": "CVE-2025-68779",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68779"
},
{
"name": "CVE-2024-56433",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
},
{
"name": "CVE-2025-21819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21819"
},
{
"name": "CVE-2025-48514",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48514"
},
{
"name": "CVE-2024-41030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41030"
},
{
"name": "CVE-2025-71199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71199"
},
{
"name": "CVE-2024-47664",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47664"
},
{
"name": "CVE-2024-36915",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36915"
},
{
"name": "CVE-2026-25749",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25749"
},
{
"name": "CVE-2024-49504",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49504"
},
{
"name": "CVE-2025-38118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38118"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2023-53367",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53367"
},
{
"name": "CVE-2022-50500",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50500"
},
{
"name": "CVE-2019-14899",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14899"
},
{
"name": "CVE-2022-29526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
},
{
"name": "CVE-2024-53098",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53098"
},
{
"name": "CVE-2025-68797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68797"
},
{
"name": "CVE-2024-49968",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49968"
},
{
"name": "CVE-2025-68358",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68358"
},
{
"name": "CVE-2025-40206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40206"
},
{
"name": "CVE-2026-23180",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23180"
},
{
"name": "CVE-2021-0164",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0164"
},
{
"name": "CVE-2024-46870",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46870"
},
{
"name": "CVE-2022-49178",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49178"
},
{
"name": "CVE-2024-22195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22195"
},
{
"name": "CVE-2023-23931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23931"
},
{
"name": "CVE-2024-49929",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49929"
},
{
"name": "CVE-2025-40257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40257"
},
{
"name": "CVE-2023-53748",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53748"
},
{
"name": "CVE-2024-26740",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26740"
},
{
"name": "CVE-2022-49173",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49173"
},
{
"name": "CVE-2024-45781",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45781"
},
{
"name": "CVE-2025-71125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71125"
},
{
"name": "CVE-2025-21947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21947"
},
{
"name": "CVE-2024-53056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53056"
},
{
"name": "CVE-2022-50551",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50551"
},
{
"name": "CVE-2026-26269",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26269"
},
{
"name": "CVE-2024-43872",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43872"
},
{
"name": "CVE-2025-71108",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71108"
},
{
"name": "CVE-2022-49401",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49401"
},
{
"name": "CVE-2025-71069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71069"
},
{
"name": "CVE-2025-68312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68312"
},
{
"name": "CVE-2025-68284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68284"
},
{
"name": "CVE-2025-68194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68194"
},
{
"name": "CVE-2023-52939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52939"
},
{
"name": "CVE-2024-14027",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-14027"
},
{
"name": "CVE-2025-38269",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38269"
},
{
"name": "CVE-2025-69649",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69649"
},
{
"name": "CVE-2024-53175",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53175"
},
{
"name": "CVE-2025-21734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21734"
},
{
"name": "CVE-2024-49859",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49859"
},
{
"name": "CVE-2025-40336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40336"
},
{
"name": "CVE-2025-37945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37945"
},
{
"name": "CVE-2025-71195",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71195"
},
{
"name": "CVE-2022-49766",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49766"
},
{
"name": "CVE-2025-6141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6141"
},
{
"name": "CVE-2025-22043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22043"
},
{
"name": "CVE-2024-49569",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49569"
},
{
"name": "CVE-2025-61984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61984"
},
{
"name": "CVE-2023-52569",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52569"
},
{
"name": "CVE-2024-56609",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56609"
},
{
"name": "CVE-2022-49940",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49940"
},
{
"name": "CVE-2026-23083",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23083"
},
{
"name": "CVE-2025-38422",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38422"
},
{
"name": "CVE-2024-56611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56611"
},
{
"name": "CVE-2025-21927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21927"
},
{
"name": "CVE-2026-23088",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23088"
},
{
"name": "CVE-2020-25743",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25743"
},
{
"name": "CVE-2022-50167",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50167"
},
{
"name": "CVE-2025-68183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68183"
},
{
"name": "CVE-2026-27704",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27704"
},
{
"name": "CVE-2022-48064",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48064"
},
{
"name": "CVE-2023-45896",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45896"
},
{
"name": "CVE-2025-37903",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37903"
},
{
"name": "CVE-2025-68774",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68774"
},
{
"name": "CVE-2024-49940",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49940"
},
{
"name": "CVE-2025-40263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40263"
},
{
"name": "CVE-2021-3735",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3735"
},
{
"name": "CVE-2025-40353",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40353"
},
{
"name": "CVE-2024-46861",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46861"
},
{
"name": "CVE-2025-40222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40222"
},
{
"name": "CVE-2022-50634",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50634"
},
{
"name": "CVE-2025-52881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52881"
},
{
"name": "CVE-2025-54514",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54514"
},
{
"name": "CVE-2025-71202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71202"
},
{
"name": "CVE-2015-7837",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7837"
},
{
"name": "CVE-2025-0677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0677"
},
{
"name": "CVE-2024-45780",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45780"
},
{
"name": "CVE-2024-46749",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46749"
},
{
"name": "CVE-2022-50492",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50492"
},
{
"name": "CVE-2024-49888",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49888"
},
{
"name": "CVE-2022-50406",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50406"
},
{
"name": "CVE-2023-26552",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26552"
},
{
"name": "CVE-2024-49921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49921"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2026-23108",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23108"
},
{
"name": "CVE-2025-71180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71180"
},
{
"name": "CVE-2025-38232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38232"
},
{
"name": "CVE-2025-68244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68244"
},
{
"name": "CVE-2025-59691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59691"
},
{
"name": "CVE-2024-46830",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46830"
},
{
"name": "CVE-2023-52481",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52481"
},
{
"name": "CVE-2023-52888",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52888"
},
{
"name": "CVE-2025-22057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22057"
},
{
"name": "CVE-2024-47666",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47666"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2025-40278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40278"
},
{
"name": "CVE-2023-0160",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0160"
},
{
"name": "CVE-2024-50056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50056"
},
{
"name": "CVE-2025-71194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71194"
},
{
"name": "CVE-2026-1788",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1788"
},
{
"name": "CVE-2023-53721",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53721"
},
{
"name": "CVE-2025-22113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22113"
},
{
"name": "CVE-2025-40342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40342"
},
{
"name": "CVE-2022-50256",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50256"
},
{
"name": "CVE-2024-42091",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42091"
},
{
"name": "CVE-2024-27983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27983"
},
{
"name": "CVE-2025-37907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37907"
},
{
"name": "CVE-2024-38625",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38625"
},
{
"name": "CVE-2025-23085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23085"
},
{
"name": "CVE-2026-22796",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22796"
},
{
"name": "CVE-2023-4010",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4010"
},
{
"name": "CVE-2025-38425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38425"
},
{
"name": "CVE-2024-46727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46727"
},
{
"name": "CVE-2023-54028",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54028"
},
{
"name": "CVE-2024-42129",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42129"
},
{
"name": "CVE-2023-54105",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54105"
},
{
"name": "CVE-2018-17977",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17977"
},
{
"name": "CVE-2019-1010204",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1010204"
},
{
"name": "CVE-2023-53992",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53992"
},
{
"name": "CVE-2026-26960",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26960"
},
{
"name": "CVE-2025-40210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40210"
},
{
"name": "CVE-2022-50354",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50354"
},
{
"name": "CVE-2025-61724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61724"
},
{
"name": "CVE-2026-22999",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22999"
},
{
"name": "CVE-2025-21812",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21812"
},
{
"name": "CVE-2025-71082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71082"
},
{
"name": "CVE-2025-12801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12801"
},
{
"name": "CVE-2024-58015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58015"
},
{
"name": "CVE-2026-23068",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23068"
},
{
"name": "CVE-2024-41079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41079"
},
{
"name": "CVE-2025-68765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68765"
},
{
"name": "CVE-2026-23089",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23089"
},
{
"name": "CVE-2024-43823",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43823"
},
{
"name": "CVE-2023-52589",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52589"
},
{
"name": "CVE-2022-41848",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41848"
},
{
"name": "CVE-2026-23216",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23216"
},
{
"name": "CVE-2023-53434",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53434"
},
{
"name": "CVE-2023-29935",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29935"
},
{
"name": "CVE-2023-35061",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35061"
},
{
"name": "CVE-2025-71132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71132"
},
{
"name": "CVE-2025-71225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71225"
},
{
"name": "CVE-2026-21636",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21636"
},
{
"name": "CVE-2026-23239",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23239"
},
{
"name": "CVE-2021-0172",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0172"
},
{
"name": "CVE-2024-47662",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47662"
},
{
"name": "CVE-2018-12930",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12930"
},
{
"name": "CVE-2026-23071",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23071"
},
{
"name": "CVE-2024-49970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49970"
},
{
"name": "CVE-2024-41067",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41067"
},
{
"name": "CVE-2024-26844",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26844"
},
{
"name": "CVE-2025-23141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23141"
},
{
"name": "CVE-2026-23056",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23056"
},
{
"name": "CVE-2025-40193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40193"
},
{
"name": "CVE-2023-32644",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32644"
},
{
"name": "CVE-2025-71077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71077"
},
{
"name": "CVE-2025-21908",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21908"
},
{
"name": "CVE-2024-46681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46681"
},
{
"name": "CVE-2024-36927",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36927"
},
{
"name": "CVE-2025-61732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61732"
},
{
"name": "CVE-2025-61723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61723"
},
{
"name": "CVE-2025-9232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9232"
},
{
"name": "CVE-2025-40012",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40012"
},
{
"name": "CVE-2025-40279",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40279"
},
{
"name": "CVE-2026-0964",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0964"
},
{
"name": "CVE-2025-68328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68328"
},
{
"name": "CVE-2023-53178",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53178"
},
{
"name": "CVE-2024-47141",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47141"
},
{
"name": "CVE-2024-8354",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8354"
},
{
"name": "CVE-2023-54323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54323"
},
{
"name": "CVE-2025-37952",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37952"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2025-0689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0689"
},
{
"name": "CVE-2022-50316",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50316"
},
{
"name": "CVE-2023-31347",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31347"
},
{
"name": "CVE-2025-40084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40084"
},
{
"name": "CVE-2025-22111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22111"
},
{
"name": "CVE-2023-53657",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53657"
},
{
"name": "CVE-2024-49915",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49915"
},
{
"name": "CVE-2026-23063",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23063"
},
{
"name": "CVE-2025-55132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55132"
},
{
"name": "CVE-2023-52732",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52732"
},
{
"name": "CVE-2022-49759",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49759"
},
{
"name": "CVE-2026-23073",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23073"
},
{
"name": "CVE-2022-49167",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49167"
},
{
"name": "CVE-2025-68311",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68311"
},
{
"name": "CVE-2026-27903",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27903"
},
{
"name": "CVE-2023-54023",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54023"
},
{
"name": "CVE-2024-27056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27056"
},
{
"name": "CVE-2023-31082",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31082"
},
{
"name": "CVE-2024-41088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41088"
},
{
"name": "CVE-2025-0690",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0690"
},
{
"name": "CVE-2025-71114",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71114"
},
{
"name": "CVE-2023-53052",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53052"
},
{
"name": "CVE-2026-23058",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23058"
},
{
"name": "CVE-2022-49234",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49234"
},
{
"name": "CVE-2022-50163",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50163"
},
{
"name": "CVE-2024-36922",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36922"
},
{
"name": "CVE-2025-71067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71067"
},
{
"name": "CVE-2024-49919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49919"
},
{
"name": "CVE-2026-23238",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23238"
},
{
"name": "CVE-2025-71182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71182"
},
{
"name": "CVE-2020-26556",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26556"
},
{
"name": "CVE-2025-46394",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46394"
},
{
"name": "CVE-2025-66471",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66471"
},
{
"name": "CVE-2026-23038",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23038"
},
{
"name": "CVE-2025-40341",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40341"
},
{
"name": "CVE-2025-38409",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38409"
},
{
"name": "CVE-2021-3826",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3826"
},
{
"name": "CVE-2024-26699",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26699"
},
{
"name": "CVE-2024-57876",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57876"
},
{
"name": "CVE-2024-58019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58019"
},
{
"name": "CVE-2026-25679",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25679"
},
{
"name": "CVE-2026-22990",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22990"
},
{
"name": "CVE-2025-14017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14017"
},
{
"name": "CVE-2022-50390",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50390"
},
{
"name": "CVE-2026-23000",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23000"
},
{
"name": "CVE-2026-21441",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21441"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2025-71186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71186"
},
{
"name": "CVE-2024-53220",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53220"
},
{
"name": "CVE-2026-23176",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23176"
},
{
"name": "CVE-2023-53539",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53539"
},
{
"name": "CVE-2025-40338",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40338"
},
{
"name": "CVE-2025-68821",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68821"
},
{
"name": "CVE-2025-31648",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31648"
},
{
"name": "CVE-2026-1229",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1229"
},
{
"name": "CVE-2025-0678",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0678"
},
{
"name": "CVE-2024-41075",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41075"
},
{
"name": "CVE-2026-23026",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23026"
},
{
"name": "CVE-2024-56674",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56674"
},
{
"name": "CVE-2024-27982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27982"
},
{
"name": "CVE-2025-40195",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40195"
},
{
"name": "CVE-2024-31884",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-31884"
},
{
"name": "CVE-2025-21976",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21976"
},
{
"name": "CVE-2019-1563",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1563"
},
{
"name": "CVE-2026-23128",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23128"
},
{
"name": "CVE-2024-57975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57975"
},
{
"name": "CVE-2023-53574",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53574"
},
{
"name": "CVE-2022-50166",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50166"
},
{
"name": "CVE-2025-61725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61725"
},
{
"name": "CVE-2025-68325",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68325"
},
{
"name": "CVE-2025-71190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71190"
},
{
"name": "CVE-2024-56738",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56738"
},
{
"name": "CVE-2022-50778",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50778"
},
{
"name": "CVE-2024-42067",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42067"
},
{
"name": "CVE-2022-49971",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49971"
},
{
"name": "CVE-2025-71089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71089"
},
{
"name": "CVE-2025-21693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21693"
},
{
"name": "CVE-2025-71203",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71203"
},
{
"name": "CVE-2024-56657",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56657"
},
{
"name": "CVE-2025-39789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39789"
},
{
"name": "CVE-2022-49124",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49124"
},
{
"name": "CVE-2024-49901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49901"
},
{
"name": "CVE-2023-52700",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52700"
},
{
"name": "CVE-2024-56583",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56583"
},
{
"name": "CVE-2022-50195",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50195"
},
{
"name": "CVE-2025-40358",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40358"
},
{
"name": "CVE-2024-40998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40998"
},
{
"name": "CVE-2024-56712",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56712"
},
{
"name": "CVE-2025-68318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68318"
},
{
"name": "CVE-2022-49980",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49980"
},
{
"name": "CVE-2023-52634",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52634"
},
{
"name": "CVE-2025-22104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22104"
},
{
"name": "CVE-2022-2795",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2795"
},
{
"name": "CVE-2025-62526",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62526"
},
{
"name": "CVE-2024-49918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49918"
},
{
"name": "CVE-2025-68296",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68296"
},
{
"name": "CVE-2023-53785",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53785"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2024-45776",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45776"
},
{
"name": "CVE-2022-50090",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50090"
},
{
"name": "CVE-2025-40340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40340"
},
{
"name": "CVE-2025-68332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68332"
},
{
"name": "CVE-2020-14356",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14356"
},
{
"name": "CVE-2025-68745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68745"
},
{
"name": "CVE-2023-54263",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54263"
},
{
"name": "CVE-2025-71104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71104"
},
{
"name": "CVE-2026-22978",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22978"
},
{
"name": "CVE-2023-53764",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53764"
},
{
"name": "CVE-2024-53687",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53687"
},
{
"name": "CVE-2025-39901",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39901"
},
{
"name": "CVE-2025-40283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40283"
},
{
"name": "CVE-2025-5918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5918"
},
{
"name": "CVE-2024-38628",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38628"
},
{
"name": "CVE-2025-40324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40324"
},
{
"name": "CVE-2025-38672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38672"
},
{
"name": "CVE-2023-54181",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54181"
},
{
"name": "CVE-2025-0684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0684"
},
{
"name": "CVE-2025-10158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10158"
},
{
"name": "CVE-2025-68378",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68378"
},
{
"name": "CVE-2024-47794",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47794"
},
{
"name": "CVE-2026-23146",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23146"
},
{
"name": "CVE-2025-38272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38272"
},
{
"name": "CVE-2024-10524",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10524"
},
{
"name": "CVE-2025-40146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40146"
},
{
"name": "CVE-2025-38359",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38359"
},
{
"name": "CVE-2019-20794",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20794"
},
{
"name": "CVE-2023-53849",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53849"
},
{
"name": "CVE-2022-4543",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4543"
},
{
"name": "CVE-2025-21899",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21899"
},
{
"name": "CVE-2024-35195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35195"
},
{
"name": "CVE-2025-38129",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38129"
},
{
"name": "CVE-2026-23037",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23037"
},
{
"name": "CVE-2023-53627",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53627"
},
{
"name": "CVE-2025-40250",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40250"
},
{
"name": "CVE-2025-38091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38091"
},
{
"name": "CVE-2023-53510",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53510"
},
{
"name": "CVE-2025-40264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40264"
},
{
"name": "CVE-2025-38334",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38334"
},
{
"name": "CVE-2023-53575",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53575"
},
{
"name": "CVE-2022-49516",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49516"
},
{
"name": "CVE-2025-40778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40778"
},
{
"name": "CVE-2025-38728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38728"
},
{
"name": "CVE-2022-3523",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3523"
},
{
"name": "CVE-2026-26157",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26157"
},
{
"name": "CVE-2026-23001",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23001"
},
{
"name": "CVE-2023-38417",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38417"
},
{
"name": "CVE-2025-68367",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68367"
},
{
"name": "CVE-2025-71224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71224"
},
{
"name": "CVE-2025-22072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22072"
},
{
"name": "CVE-2025-68820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68820"
},
{
"name": "CVE-2021-45261",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45261"
},
{
"name": "CVE-2025-40074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40074"
},
{
"name": "CVE-2026-23193",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23193"
},
{
"name": "CVE-2025-40321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40321"
},
{
"name": "CVE-2024-47736",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47736"
},
{
"name": "CVE-2023-53037",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53037"
},
{
"name": "CVE-2024-46842",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46842"
},
{
"name": "CVE-2025-71237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71237"
},
{
"name": "CVE-2025-13462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13462"
},
{
"name": "CVE-2024-50112",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50112"
},
{
"name": "CVE-2025-69646",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69646"
},
{
"name": "CVE-2023-54207",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54207"
},
{
"name": "CVE-2026-23215",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23215"
},
{
"name": "CVE-2024-28956",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28956"
},
{
"name": "CVE-2025-68740",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68740"
},
{
"name": "CVE-2020-26142",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26142"
},
{
"name": "CVE-2022-49955",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49955"
},
{
"name": "CVE-2023-53628",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53628"
},
{
"name": "CVE-2025-29943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29943"
},
{
"name": "CVE-2025-39978",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39978"
},
{
"name": "CVE-2023-31346",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31346"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2025-40158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40158"
},
{
"name": "CVE-2024-56201",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56201"
},
{
"name": "CVE-2025-38071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38071"
},
{
"name": "CVE-2025-38140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38140"
},
{
"name": "CVE-2022-50002",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50002"
},
{
"name": "CVE-2025-38621",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38621"
},
{
"name": "CVE-2025-68742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68742"
},
{
"name": "CVE-2025-39908",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39908"
},
{
"name": "CVE-2026-24842",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24842"
},
{
"name": "CVE-2024-49920",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49920"
},
{
"name": "CVE-2025-40282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40282"
},
{
"name": "CVE-2026-23118",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23118"
},
{
"name": "CVE-2025-34034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-34034"
},
{
"name": "CVE-2025-37984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37984"
},
{
"name": "CVE-2025-59692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59692"
},
{
"name": "CVE-2022-50116",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50116"
},
{
"name": "CVE-2018-12931",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12931"
},
{
"name": "CVE-2025-40168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40168"
},
{
"name": "CVE-2025-37856",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37856"
},
{
"name": "CVE-2022-50224",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50224"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2020-13791",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13791"
},
{
"name": "CVE-2026-23950",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23950"
},
{
"name": "CVE-2024-49990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49990"
},
{
"name": "CVE-2020-15802",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15802"
},
{
"name": "CVE-2020-24240",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24240"
},
{
"name": "CVE-2024-46718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46718"
},
{
"name": "CVE-2025-68816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68816"
},
{
"name": "CVE-2024-41045",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41045"
},
{
"name": "CVE-2023-53545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53545"
},
{
"name": "CVE-2022-50552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50552"
},
{
"name": "CVE-2021-0066",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0066"
},
{
"name": "CVE-2025-38333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38333"
},
{
"name": "CVE-2023-53376",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53376"
},
{
"name": "CVE-2023-53538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53538"
},
{
"name": "CVE-2025-68192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68192"
},
{
"name": "CVE-2024-5569",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5569"
},
{
"name": "CVE-2025-68379",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68379"
},
{
"name": "CVE-2022-50357",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50357"
},
{
"name": "CVE-2024-57952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57952"
},
{
"name": "CVE-2025-68256",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68256"
},
{
"name": "CVE-2025-68777",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68777"
},
{
"name": "CVE-2023-52671",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52671"
},
{
"name": "CVE-2022-50303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50303"
},
{
"name": "CVE-2024-35870",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35870"
},
{
"name": "CVE-2025-68254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68254"
},
{
"name": "CVE-2026-23221",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23221"
},
{
"name": "CVE-2025-38059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38059"
},
{
"name": "CVE-2024-27014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27014"
},
{
"name": "CVE-2024-36013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36013"
},
{
"name": "CVE-2024-53176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53176"
},
{
"name": "CVE-2025-37956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37956"
},
{
"name": "CVE-2025-40196",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40196"
},
{
"name": "CVE-2024-49880",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49880"
},
{
"name": "CVE-2023-52676",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52676"
},
{
"name": "CVE-2025-38117",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38117"
},
{
"name": "CVE-2017-13165",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13165"
},
{
"name": "CVE-2025-38556",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38556"
},
{
"name": "CVE-2025-68171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68171"
},
{
"name": "CVE-2025-39932",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39932"
},
{
"name": "CVE-2024-47683",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47683"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2024-46811",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46811"
},
{
"name": "CVE-2025-21985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21985"
},
{
"name": "CVE-2025-22109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22109"
},
{
"name": "CVE-2025-38300",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38300"
},
{
"name": "CVE-2025-40040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40040"
},
{
"name": "CVE-2023-53635",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53635"
},
{
"name": "CVE-2025-39810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39810"
},
{
"name": "CVE-2026-22982",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22982"
},
{
"name": "CVE-2025-23132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23132"
},
{
"name": "CVE-2024-47678",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47678"
},
{
"name": "CVE-2022-49531",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49531"
},
{
"name": "CVE-2022-49504",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49504"
},
{
"name": "CVE-2025-1376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1376"
},
{
"name": "CVE-2022-49810",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49810"
},
{
"name": "CVE-2025-47912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47912"
},
{
"name": "CVE-2025-71109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71109"
},
{
"name": "CVE-2023-26586",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26586"
},
{
"name": "CVE-2025-38373",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38373"
},
{
"name": "CVE-2025-66861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66861"
},
{
"name": "CVE-2025-40095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40095"
},
{
"name": "CVE-2025-37957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37957"
},
{
"name": "CVE-2025-38369",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38369"
},
{
"name": "CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"name": "CVE-2024-44950",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44950"
},
{
"name": "CVE-2025-39759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39759"
},
{
"name": "CVE-2022-50332",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50332"
},
{
"name": "CVE-2023-53822",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53822"
},
{
"name": "CVE-2024-27408",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27408"
},
{
"name": "CVE-2025-71222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71222"
},
{
"name": "CVE-2022-50461",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50461"
},
{
"name": "CVE-2025-21801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21801"
},
{
"name": "CVE-2023-26554",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26554"
},
{
"name": "CVE-2025-38486",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38486"
},
{
"name": "CVE-2021-26934",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26934"
},
{
"name": "CVE-2023-53466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53466"
},
{
"name": "CVE-2025-21629",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21629"
},
{
"name": "CVE-2025-71118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71118"
},
{
"name": "CVE-2023-53168",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53168"
},
{
"name": "CVE-2022-49528",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49528"
},
{
"name": "CVE-2025-68160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68160"
},
{
"name": "CVE-2022-45888",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45888"
},
{
"name": "CVE-2022-49218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49218"
},
{
"name": "CVE-2023-52749",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52749"
},
{
"name": "CVE-2025-39754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39754"
},
{
"name": "CVE-2025-40286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40286"
},
{
"name": "CVE-2022-49967",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49967"
},
{
"name": "CVE-2025-68327",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68327"
},
{
"name": "CVE-2024-2236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2236"
},
{
"name": "CVE-2022-49245",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49245"
},
{
"name": "CVE-2025-38098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38098"
},
{
"name": "CVE-2023-52682",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52682"
},
{
"name": "CVE-2022-50871",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50871"
},
{
"name": "CVE-2025-71150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71150"
},
{
"name": "CVE-2025-71229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71229"
},
{
"name": "CVE-2026-23213",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23213"
},
{
"name": "CVE-2025-39958",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39958"
},
{
"name": "CVE-2018-8956",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8956"
},
{
"name": "CVE-2025-40266",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40266"
},
{
"name": "CVE-2026-23091",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23091"
},
{
"name": "CVE-2025-68241",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68241"
},
{
"name": "CVE-2022-49420",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49420"
},
{
"name": "CVE-2022-40964",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40964"
},
{
"name": "CVE-2026-3441",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3441"
},
{
"name": "CVE-2024-36244",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36244"
},
{
"name": "CVE-2023-53149",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53149"
},
{
"name": "CVE-2026-23237",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23237"
},
{
"name": "CVE-2024-49987",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49987"
},
{
"name": "CVE-2025-60753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-60753"
},
{
"name": "CVE-2022-50746",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50746"
},
{
"name": "CVE-2025-52565",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52565"
},
{
"name": "CVE-2024-50034",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50034"
},
{
"name": "CVE-2025-38259",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38259"
},
{
"name": "CVE-2025-71192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71192"
},
{
"name": "CVE-2023-53596",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53596"
},
{
"name": "CVE-2022-49943",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49943"
},
{
"name": "CVE-2022-50260",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50260"
},
{
"name": "CVE-2025-40135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40135"
},
{
"name": "CVE-2026-23121",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23121"
},
{
"name": "CVE-2020-12319",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12319"
},
{
"name": "CVE-2025-37951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37951"
},
{
"name": "CVE-2023-50495",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50495"
},
{
"name": "CVE-2024-49568",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49568"
},
{
"name": "CVE-2025-21750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21750"
},
{
"name": "CVE-2024-36924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36924"
},
{
"name": "CVE-2017-11164",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11164"
},
{
"name": "CVE-2023-3397",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3397"
},
{
"name": "CVE-2025-68734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68734"
},
{
"name": "CVE-2024-26672",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26672"
},
{
"name": "CVE-2024-57924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57924"
},
{
"name": "CVE-2025-37947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37947"
},
{
"name": "CVE-2025-68776",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68776"
},
{
"name": "CVE-2025-61728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61728"
},
{
"name": "CVE-2025-71066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71066"
},
{
"name": "CVE-2026-0965",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0965"
},
{
"name": "CVE-2023-53806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53806"
},
{
"name": "CVE-2025-21817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21817"
},
{
"name": "CVE-2025-68972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68972"
},
{
"name": "CVE-2025-68799",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68799"
},
{
"name": "CVE-2021-33139",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33139"
},
{
"name": "CVE-2025-58186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58186"
},
{
"name": "CVE-2025-21825",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21825"
},
{
"name": "CVE-2025-38192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38192"
},
{
"name": "CVE-2025-71236",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71236"
},
{
"name": "CVE-2025-68345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68345"
},
{
"name": "CVE-2025-39800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39800"
},
{
"name": "CVE-2024-50057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50057"
},
{
"name": "CVE-2025-38343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38343"
},
{
"name": "CVE-2025-71097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71097"
},
{
"name": "CVE-2024-46808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46808"
},
{
"name": "CVE-2026-26158",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26158"
},
{
"name": "CVE-2025-38202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38202"
},
{
"name": "CVE-2025-68288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68288"
},
{
"name": "CVE-2025-38168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38168"
},
{
"name": "CVE-2023-53547",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53547"
},
{
"name": "CVE-2019-20426",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20426"
},
{
"name": "CVE-2025-71107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71107"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2025-40310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40310"
},
{
"name": "CVE-2026-29786",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-29786"
},
{
"name": "CVE-2025-58187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58187"
},
{
"name": "CVE-2025-40083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40083"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2024-56584",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56584"
},
{
"name": "CVE-2026-23235",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23235"
},
{
"name": "CVE-2025-71111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71111"
},
{
"name": "CVE-2022-4899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4899"
},
{
"name": "CVE-2025-71152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71152"
},
{
"name": "CVE-2024-42139",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42139"
},
{
"name": "CVE-2024-56692",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56692"
},
{
"name": "CVE-2024-53196",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53196"
},
{
"name": "CVE-2025-38665",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38665"
},
{
"name": "CVE-2022-50212",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50212"
},
{
"name": "CVE-2026-23087",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23087"
},
{
"name": "CVE-2023-54259",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54259"
},
{
"name": "CVE-2025-68802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68802"
},
{
"name": "CVE-2023-54067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54067"
},
{
"name": "CVE-2025-1369",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1369"
},
{
"name": "CVE-2022-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3219"
},
{
"name": "CVE-2025-68317",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68317"
},
{
"name": "CVE-2023-53231",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53231"
},
{
"name": "CVE-2025-71185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71185"
},
{
"name": "CVE-2022-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2961"
},
{
"name": "CVE-2025-40331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40331"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2022-49635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49635"
},
{
"name": "CVE-2024-50017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50017"
},
{
"name": "CVE-2026-23096",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23096"
},
{
"name": "CVE-2024-53241",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53241"
},
{
"name": "CVE-2025-38704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38704"
},
{
"name": "CVE-2023-34969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34969"
},
{
"name": "CVE-2021-33155",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33155"
},
{
"name": "CVE-2025-68337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68337"
},
{
"name": "CVE-2024-57899",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57899"
},
{
"name": "CVE-2024-49928",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49928"
},
{
"name": "CVE-2025-21885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21885"
},
{
"name": "CVE-2024-50187",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50187"
},
{
"name": "CVE-2022-50851",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50851"
},
{
"name": "CVE-2025-36001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36001"
},
{
"name": "CVE-2022-50464",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50464"
},
{
"name": "CVE-2025-38674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38674"
},
{
"name": "CVE-2025-40093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40093"
},
{
"name": "CVE-2020-26560",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26560"
},
{
"name": "CVE-2024-26714",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26714"
},
{
"name": "CVE-2024-45777",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45777"
},
{
"name": "CVE-2025-38040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38040"
},
{
"name": "CVE-2024-40954",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40954"
},
{
"name": "CVE-2022-49965",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49965"
},
{
"name": "CVE-2025-54771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54771"
},
{
"name": "CVE-2024-0564",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0564"
},
{
"name": "CVE-2025-39825",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39825"
},
{
"name": "CVE-2025-71131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71131"
},
{
"name": "CVE-2022-49961",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49961"
},
{
"name": "CVE-2025-69651",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69651"
},
{
"name": "CVE-2025-38552",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38552"
},
{
"name": "CVE-2025-40335",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40335"
},
{
"name": "CVE-2025-40149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40149"
},
{
"name": "CVE-2024-58098",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58098"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2022-28667",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28667"
},
{
"name": "CVE-2023-53383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53383"
},
{
"name": "CVE-2024-46717",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46717"
},
{
"name": "CVE-2024-25743",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25743"
},
{
"name": "CVE-2022-50704",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50704"
},
{
"name": "CVE-2025-40164",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40164"
},
{
"name": "CVE-2023-54125",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54125"
},
{
"name": "CVE-2025-10911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10911"
},
{
"name": "CVE-2026-23164",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23164"
},
{
"name": "CVE-2024-41036",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41036"
},
{
"name": "CVE-2023-53751",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53751"
},
{
"name": "CVE-2025-0033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0033"
},
{
"name": "CVE-2023-53743",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53743"
},
{
"name": "CVE-2024-42319",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42319"
},
{
"name": "CVE-2025-37928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37928"
},
{
"name": "CVE-2017-13716",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13716"
},
{
"name": "CVE-2024-22018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22018"
},
{
"name": "CVE-2025-71116",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71116"
},
{
"name": "CVE-2022-40735",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40735"
},
{
"name": "CVE-2024-36024",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36024"
},
{
"name": "CVE-2025-21723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21723"
},
{
"name": "CVE-2023-54190",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54190"
},
{
"name": "CVE-2023-52879",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52879"
},
{
"name": "CVE-2025-68281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68281"
},
{
"name": "CVE-2023-52837",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52837"
},
{
"name": "CVE-2025-38440",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38440"
},
{
"name": "CVE-2026-23124",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23124"
},
{
"name": "CVE-2023-52981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52981"
},
{
"name": "CVE-2024-53224",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53224"
},
{
"name": "CVE-2024-49910",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49910"
},
{
"name": "CVE-2025-68362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68362"
},
{
"name": "CVE-2023-53105",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53105"
},
{
"name": "CVE-2025-68236",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68236"
},
{
"name": "CVE-2024-39286",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39286"
},
{
"name": "CVE-2025-14524",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14524"
},
{
"name": "CVE-2024-49855",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49855"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2025-68333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68333"
},
{
"name": "CVE-2024-47689",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47689"
},
{
"name": "CVE-2025-71160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71160"
},
{
"name": "CVE-2025-71232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71232"
},
{
"name": "CVE-2023-52625",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52625"
},
{
"name": "CVE-2023-53353",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53353"
},
{
"name": "CVE-2024-58096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58096"
},
{
"name": "CVE-2025-38225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38225"
},
{
"name": "CVE-2023-53401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53401"
},
{
"name": "CVE-2025-22037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22037"
},
{
"name": "CVE-2023-53702",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53702"
},
{
"name": "CVE-2025-68290",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68290"
},
{
"name": "CVE-2025-40280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40280"
},
{
"name": "CVE-2024-26842",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26842"
},
{
"name": "CVE-2025-40099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40099"
},
{
"name": "CVE-2023-54059",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54059"
},
{
"name": "CVE-2025-71162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71162"
},
{
"name": "CVE-2021-0170",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0170"
},
{
"name": "CVE-2024-40966",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40966"
},
{
"name": "CVE-2024-53133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53133"
},
{
"name": "CVE-2026-23075",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23075"
},
{
"name": "CVE-2022-50571",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50571"
},
{
"name": "CVE-2021-31879",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31879"
},
{
"name": "CVE-2026-23120",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23120"
},
{
"name": "CVE-2025-40180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40180"
},
{
"name": "CVE-2022-49393",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49393"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2025-68803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68803"
},
{
"name": "CVE-2026-22996",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22996"
},
{
"name": "CVE-2024-53091",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53091"
},
{
"name": "CVE-2025-39851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39851"
},
{
"name": "CVE-2025-71204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71204"
},
{
"name": "CVE-2025-68331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68331"
},
{
"name": "CVE-2025-38244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38244"
},
{
"name": "CVE-2022-29217",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29217"
},
{
"name": "CVE-2024-26758",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26758"
},
{
"name": "CVE-2025-38080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38080"
},
{
"name": "CVE-2023-32651",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32651"
},
{
"name": "CVE-2025-37747",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37747"
},
{
"name": "CVE-2026-2297",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2297"
},
{
"name": "CVE-2026-23105",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23105"
},
{
"name": "CVE-2023-53036",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53036"
},
{
"name": "CVE-2025-38615",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38615"
},
{
"name": "CVE-2025-58181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58181"
},
{
"name": "CVE-2025-71115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71115"
},
{
"name": "CVE-2026-22976",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22976"
},
{
"name": "CVE-2022-50862",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50862"
},
{
"name": "CVE-2025-1118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1118"
},
{
"name": "CVE-2024-50166",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50166"
},
{
"name": "CVE-2024-35862",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35862"
},
{
"name": "CVE-2023-53355",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53355"
},
{
"name": "CVE-2022-25265",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25265"
},
{
"name": "CVE-2026-0967",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0967"
},
{
"name": "CVE-2026-23181",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23181"
},
{
"name": "CVE-2025-37944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37944"
},
{
"name": "CVE-2023-53558",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53558"
},
{
"name": "CVE-2025-47914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47914"
},
{
"name": "CVE-2025-68214",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68214"
},
{
"name": "CVE-2025-38703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38703"
},
{
"name": "CVE-2026-23141",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23141"
},
{
"name": "CVE-2026-22860",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22860"
},
{
"name": "CVE-2025-36365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36365"
},
{
"name": "CVE-2025-9403",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9403"
},
{
"name": "CVE-2025-40247",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40247"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2024-56641",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56641"
},
{
"name": "CVE-2024-43842",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43842"
},
{
"name": "CVE-2025-0686",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0686"
},
{
"name": "CVE-2025-21739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21739"
},
{
"name": "CVE-2024-49992",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49992"
},
{
"name": "CVE-2025-68781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68781"
},
{
"name": "CVE-2025-39753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39753"
},
{
"name": "CVE-2025-69418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69418"
},
{
"name": "CVE-2026-23182",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23182"
},
{
"name": "CVE-2021-0173",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0173"
},
{
"name": "CVE-2025-71112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71112"
},
{
"name": "CVE-2023-54285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54285"
},
{
"name": "CVE-2024-45778",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45778"
},
{
"name": "CVE-2026-23086",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23086"
},
{
"name": "CVE-2024-47661",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47661"
},
{
"name": "CVE-2026-28418",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28418"
},
{
"name": "CVE-2023-54151",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54151"
},
{
"name": "CVE-2025-22022",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22022"
},
{
"name": "CVE-2025-66864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66864"
},
{
"name": "CVE-2024-46803",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46803"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2025-59466",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59466"
},
{
"name": "CVE-2025-40192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40192"
},
{
"name": "CVE-2025-38544",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38544"
},
{
"name": "CVE-2025-39797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39797"
},
{
"name": "CVE-2025-68818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68818"
},
{
"name": "CVE-2022-36351",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36351"
},
{
"name": "CVE-2023-52921",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52921"
},
{
"name": "CVE-2025-15468",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15468"
},
{
"name": "CVE-2024-36478",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36478"
},
{
"name": "CVE-2024-43832",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43832"
},
{
"name": "CVE-2026-1299",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1299"
},
{
"name": "CVE-2024-54683",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54683"
},
{
"name": "CVE-2025-1150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1150"
},
{
"name": "CVE-2024-46720",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46720"
},
{
"name": "CVE-2024-26658",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26658"
},
{
"name": "CVE-2026-2243",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2243"
},
{
"name": "CVE-2025-38198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38198"
},
{
"name": "CVE-2025-58189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58189"
},
{
"name": "CVE-2022-36087",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36087"
},
{
"name": "CVE-2024-38564",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38564"
},
{
"name": "CVE-2021-0174",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0174"
},
{
"name": "CVE-2025-8746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8746"
},
{
"name": "CVE-2025-36442",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36442"
},
{
"name": "CVE-2025-38006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38006"
},
{
"name": "CVE-2025-40102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40102"
},
{
"name": "CVE-2026-0968",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0968"
},
{
"name": "CVE-2025-40170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40170"
},
{
"name": "CVE-2025-38437",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38437"
},
{
"name": "CVE-2025-40160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40160"
},
{
"name": "CVE-2023-7008",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7008"
},
{
"name": "CVE-2024-45779",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45779"
},
{
"name": "CVE-2025-40284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40284"
},
{
"name": "CVE-2025-38125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38125"
},
{
"name": "CVE-2025-40077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40077"
},
{
"name": "CVE-2024-57857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57857"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2022-50213",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50213"
},
{
"name": "CVE-2024-46823",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46823"
},
{
"name": "CVE-2023-32642",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32642"
},
{
"name": "CVE-2025-71227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71227"
},
{
"name": "CVE-2024-46733",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46733"
},
{
"name": "CVE-2024-41014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41014"
},
{
"name": "CVE-2022-50015",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50015"
},
{
"name": "CVE-2025-40071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40071"
},
{
"name": "CVE-2024-7883",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7883"
},
{
"name": "CVE-2024-50271",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50271"
},
{
"name": "CVE-2022-50772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50772"
},
{
"name": "CVE-2024-56717",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56717"
},
{
"name": "CVE-2025-68366",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68366"
},
{
"name": "CVE-2024-56707",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56707"
},
{
"name": "CVE-2023-54234",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54234"
},
{
"name": "CVE-2022-45885",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45885"
},
{
"name": "CVE-2022-49783",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49783"
},
{
"name": "CVE-2025-40305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40305"
},
{
"name": "CVE-2016-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2781"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2025-47153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47153"
},
{
"name": "CVE-2025-40080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40080"
},
{
"name": "CVE-2024-53216",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53216"
},
{
"name": "CVE-2022-49539",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49539"
},
{
"name": "CVE-2024-36347",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36347"
},
{
"name": "CVE-2024-26869",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26869"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2025-68815",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68815"
},
{
"name": "CVE-2021-20255",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20255"
},
{
"name": "CVE-2022-48979",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48979"
},
{
"name": "CVE-2025-40307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40307"
},
{
"name": "CVE-2025-71193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71193"
},
{
"name": "CVE-2023-54180",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54180"
},
{
"name": "CVE-2026-23095",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23095"
},
{
"name": "CVE-2024-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46848"
},
{
"name": "CVE-2025-68346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68346"
},
{
"name": "CVE-2025-38081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38081"
},
{
"name": "CVE-2024-36009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36009"
},
{
"name": "CVE-2025-71163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71163"
},
{
"name": "CVE-2024-36350",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36350"
},
{
"name": "CVE-2023-25951",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25951"
},
{
"name": "CVE-2025-40211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40211"
},
{
"name": "CVE-2023-53152",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53152"
},
{
"name": "CVE-2021-0308",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0308"
},
{
"name": "CVE-2025-68315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68315"
},
{
"name": "CVE-2024-50009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50009"
},
{
"name": "CVE-2025-39850",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39850"
},
{
"name": "CVE-2022-1205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1205"
},
{
"name": "CVE-2023-45927",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45927"
},
{
"name": "CVE-2020-25742",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25742"
},
{
"name": "CVE-2022-0987",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0987"
},
{
"name": "CVE-2025-71096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71096"
},
{
"name": "CVE-2025-71095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71095"
},
{
"name": "CVE-2025-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40217"
},
{
"name": "CVE-2025-38199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38199"
},
{
"name": "CVE-2025-39905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39905"
},
{
"name": "CVE-2025-21944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21944"
},
{
"name": "CVE-2022-50720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50720"
},
{
"name": "CVE-2025-71105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71105"
},
{
"name": "CVE-2023-50387",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50387"
},
{
"name": "CVE-2022-49529",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49529"
},
{
"name": "CVE-2025-68266",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68266"
},
{
"name": "CVE-2024-27057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27057"
},
{
"name": "CVE-2025-68771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68771"
},
{
"name": "CVE-2025-39961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39961"
},
{
"name": "CVE-2025-68363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68363"
},
{
"name": "CVE-2024-54456",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54456"
},
{
"name": "CVE-2024-26876",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26876"
},
{
"name": "CVE-2025-40248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40248"
},
{
"name": "CVE-2023-52657",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52657"
},
{
"name": "CVE-2025-37876",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37876"
},
{
"name": "CVE-2024-58089",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58089"
},
{
"name": "CVE-2024-36331",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36331"
},
{
"name": "CVE-2026-27571",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27571"
},
{
"name": "CVE-2025-39748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39748"
},
{
"name": "CVE-2026-22984",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22984"
},
{
"name": "CVE-2026-27139",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27139"
},
{
"name": "CVE-2022-49127",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49127"
},
{
"name": "CVE-2020-25741",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25741"
},
{
"name": "CVE-2022-50748",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50748"
},
{
"name": "CVE-2023-53767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53767"
},
{
"name": "CVE-2025-21667",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21667"
},
{
"name": "CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"name": "CVE-2023-49083",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49083"
},
{
"name": "CVE-2025-21696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21696"
},
{
"name": "CVE-2025-68303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68303"
},
{
"name": "CVE-2025-21955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21955"
},
{
"name": "CVE-2025-39863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39863"
},
{
"name": "CVE-2025-40259",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40259"
},
{
"name": "CVE-2023-53180",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53180"
},
{
"name": "CVE-2026-28419",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28419"
},
{
"name": "CVE-2025-8677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8677"
},
{
"name": "CVE-2025-38560",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38560"
},
{
"name": "CVE-2023-53385",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53385"
},
{
"name": "CVE-2026-23206",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23206"
},
{
"name": "CVE-2025-68757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68757"
},
{
"name": "CVE-2024-46678",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46678"
},
{
"name": "CVE-2024-58097",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58097"
},
{
"name": "CVE-2023-53620",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53620"
},
{
"name": "CVE-2022-50539",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50539"
},
{
"name": "CVE-2025-71068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71068"
},
{
"name": "CVE-2025-23130",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23130"
},
{
"name": "CVE-2022-49496",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49496"
},
{
"name": "CVE-2025-38349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38349"
},
{
"name": "CVE-2024-56782",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56782"
},
{
"name": "CVE-2025-39957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39957"
},
{
"name": "CVE-2025-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1352"
},
{
"name": "CVE-2023-53540",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53540"
},
{
"name": "CVE-2022-49552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49552"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2023-53261",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53261"
},
{
"name": "CVE-2026-23033",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23033"
},
{
"name": "CVE-2025-39726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39726"
},
{
"name": "CVE-2024-26759",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26759"
},
{
"name": "CVE-2025-39931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39931"
},
{
"name": "CVE-2023-54187",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54187"
},
{
"name": "CVE-2026-22977",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22977"
},
{
"name": "CVE-2026-23145",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23145"
},
{
"name": "CVE-2022-44032",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44032"
},
{
"name": "CVE-2024-57895",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57895"
},
{
"name": "CVE-2023-53240",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53240"
},
{
"name": "CVE-2025-13735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13735"
},
{
"name": "CVE-2023-53694",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53694"
},
{
"name": "CVE-2024-53195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53195"
},
{
"name": "CVE-2024-35794",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35794"
},
{
"name": "CVE-2023-52829",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52829"
},
{
"name": "CVE-2026-23003",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23003"
},
{
"name": "CVE-2025-21891",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21891"
},
{
"name": "CVE-2025-38716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38716"
},
{
"name": "CVE-2025-11187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11187"
},
{
"name": "CVE-2024-56660",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56660"
},
{
"name": "CVE-2026-23076",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23076"
},
{
"name": "CVE-2023-54145",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54145"
},
{
"name": "CVE-2025-38033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38033"
},
{
"name": "CVE-2024-41023",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41023"
},
{
"name": "CVE-2024-47704",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47704"
},
{
"name": "CVE-2025-21672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21672"
},
{
"name": "CVE-2024-35801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35801"
},
{
"name": "CVE-2024-49978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49978"
},
{
"name": "CVE-2024-36910",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36910"
},
{
"name": "CVE-2025-15079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15079"
},
{
"name": "CVE-2024-49870",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49870"
},
{
"name": "CVE-2025-36366",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36366"
},
{
"name": "CVE-2024-42125",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42125"
},
{
"name": "CVE-2025-36123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36123"
},
{
"name": "CVE-2024-56737",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56737"
},
{
"name": "CVE-2025-68168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68168"
},
{
"name": "CVE-2025-21821",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21821"
},
{
"name": "CVE-2025-68206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68206"
},
{
"name": "CVE-2020-11935",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11935"
},
{
"name": "CVE-2023-54247",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54247"
},
{
"name": "CVE-2025-68309",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68309"
},
{
"name": "CVE-2023-52905",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52905"
},
{
"name": "CVE-2024-57852",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57852"
},
{
"name": "CVE-2025-40003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40003"
},
{
"name": "CVE-2025-22042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22042"
},
{
"name": "CVE-2025-71158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71158"
},
{
"name": "CVE-2022-49803",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49803"
},
{
"name": "CVE-2024-57898",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57898"
},
{
"name": "CVE-2020-35503",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35503"
},
{
"name": "CVE-2024-49923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49923"
},
{
"name": "CVE-2024-56639",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56639"
},
{
"name": "CVE-2025-68372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68372"
},
{
"name": "CVE-2026-23171",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23171"
},
{
"name": "CVE-2024-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
},
{
"name": "CVE-2023-53002",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53002"
},
{
"name": "CVE-2021-0183",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0183"
},
{
"name": "CVE-2025-39884",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39884"
},
{
"name": "CVE-2025-39747",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39747"
},
{
"name": "CVE-2024-36914",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36914"
},
{
"name": "CVE-2026-26996",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26996"
},
{
"name": "CVE-2024-35826",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35826"
},
{
"name": "CVE-2026-23112",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23112"
},
{
"name": "CVE-2022-49764",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49764"
},
{
"name": "CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"name": "CVE-2025-21651",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21651"
},
{
"name": "CVE-2025-38092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38092"
},
{
"name": "CVE-2025-22124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22124"
},
{
"name": "CVE-2025-68313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68313"
},
{
"name": "CVE-2024-58053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58053"
},
{
"name": "CVE-2023-26553",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26553"
},
{
"name": "CVE-2025-60876",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-60876"
},
{
"name": "CVE-2025-37776",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37776"
},
{
"name": "CVE-2021-23840",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23840"
},
{
"name": "CVE-2024-58077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58077"
},
{
"name": "CVE-2024-6519",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6519"
},
{
"name": "CVE-2024-46729",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46729"
},
{
"name": "CVE-2023-53850",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53850"
},
{
"name": "CVE-2023-2975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
},
{
"name": "CVE-2022-50266",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50266"
},
{
"name": "CVE-2024-53178",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53178"
},
{
"name": "CVE-2025-71137",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71137"
},
{
"name": "CVE-2026-23084",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23084"
},
{
"name": "CVE-2023-53093",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53093"
},
{
"name": "CVE-2025-11065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11065"
},
{
"name": "CVE-2026-23190",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23190"
},
{
"name": "CVE-2025-40123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40123"
},
{
"name": "CVE-2026-22979",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22979"
},
{
"name": "CVE-2025-68301",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68301"
},
{
"name": "CVE-2024-49991",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49991"
},
{
"name": "CVE-2022-50009",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50009"
},
{
"name": "CVE-2022-26047",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26047"
},
{
"name": "CVE-2024-53240",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53240"
},
{
"name": "CVE-2026-23011",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23011"
},
{
"name": "CVE-2024-36949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36949"
},
{
"name": "CVE-2023-53816",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53816"
},
{
"name": "CVE-2025-37877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37877"
},
{
"name": "CVE-2024-2193",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2193"
},
{
"name": "CVE-2025-4382",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4382"
},
{
"name": "CVE-2022-28693",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28693"
},
{
"name": "CVE-2025-71161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71161"
},
{
"name": "CVE-2025-39706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39706"
},
{
"name": "CVE-2025-22038",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22038"
},
{
"name": "CVE-2025-68217",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68217"
},
{
"name": "CVE-2023-54242",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54242"
},
{
"name": "CVE-2025-68289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68289"
},
{
"name": "CVE-2025-40363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40363"
},
{
"name": "CVE-2024-41062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41062"
},
{
"name": "CVE-2025-40253",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40253"
},
{
"name": "CVE-2022-48816",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48816"
},
{
"name": "CVE-2025-37800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37800"
},
{
"name": "CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"name": "CVE-2022-50518",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50518"
},
{
"name": "CVE-2022-49829",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49829"
},
{
"name": "CVE-2025-64756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64756"
},
{
"name": "CVE-2025-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21967"
},
{
"name": "CVE-2016-2568",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2568"
},
{
"name": "CVE-2020-13817",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13817"
},
{
"name": "CVE-2025-68245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68245"
},
{
"name": "CVE-2018-12929",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12929"
},
{
"name": "CVE-2024-26853",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26853"
},
{
"name": "CVE-2024-53147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53147"
},
{
"name": "CVE-2025-39952",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39952"
},
{
"name": "CVE-2025-40317",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40317"
},
{
"name": "CVE-2024-45783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45783"
},
{
"name": "CVE-2026-23110",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23110"
},
{
"name": "CVE-2023-53410",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53410"
},
{
"name": "CVE-2023-53254",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53254"
},
{
"name": "CVE-2024-34064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34064"
},
{
"name": "CVE-2023-47210",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47210"
},
{
"name": "CVE-2025-68809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68809"
},
{
"name": "CVE-2024-36920",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36920"
},
{
"name": "CVE-2021-0165",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0165"
},
{
"name": "CVE-2025-0624",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0624"
},
{
"name": "CVE-2022-49177",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49177"
},
{
"name": "CVE-2025-38205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38205"
},
{
"name": "CVE-2026-23100",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23100"
},
{
"name": "CVE-2025-59464",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59464"
},
{
"name": "CVE-2024-58241",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58241"
},
{
"name": "CVE-2025-21863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21863"
},
{
"name": "CVE-2025-71120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71120"
},
{
"name": "CVE-2025-38166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38166"
},
{
"name": "CVE-2022-49833",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49833"
},
{
"name": "CVE-2026-23060",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23060"
},
{
"name": "CVE-2025-38321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38321"
},
{
"name": "CVE-2025-68282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68282"
},
{
"name": "CVE-2025-39705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39705"
},
{
"name": "CVE-2025-68817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68817"
},
{
"name": "CVE-2024-36021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36021"
},
{
"name": "CVE-2025-38045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38045"
},
{
"name": "CVE-2024-46726",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46726"
},
{
"name": "CVE-2025-40025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40025"
},
{
"name": "CVE-2024-53079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53079"
},
{
"name": "CVE-2025-68787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68787"
},
{
"name": "CVE-2025-1125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1125"
},
{
"name": "CVE-2023-53647",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53647"
},
{
"name": "CVE-2025-37954",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37954"
},
{
"name": "CVE-2025-23133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23133"
},
{
"name": "CVE-2025-0012",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0012"
},
{
"name": "CVE-2020-12313",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12313"
},
{
"name": "CVE-2025-71233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71233"
},
{
"name": "CVE-2025-68782",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68782"
},
{
"name": "CVE-2021-0166",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0166"
},
{
"name": "CVE-2025-21945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21945"
},
{
"name": "CVE-2022-3872",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3872"
},
{
"name": "CVE-2025-39744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39744"
},
{
"name": "CVE-2025-71197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71197"
},
{
"name": "CVE-2025-68177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68177"
},
{
"name": "CVE-2025-68758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68758"
},
{
"name": "CVE-2024-49931",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49931"
},
{
"name": "CVE-2024-43866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43866"
},
{
"name": "CVE-2024-37021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37021"
},
{
"name": "CVE-2024-47728",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47728"
},
{
"name": "CVE-2025-68191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68191"
},
{
"name": "CVE-2026-23031",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23031"
},
{
"name": "CVE-2024-46730",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46730"
},
{
"name": "CVE-2025-71113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71113"
},
{
"name": "CVE-2025-71127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71127"
},
{
"name": "CVE-2025-37786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37786"
},
{
"name": "CVE-2024-46728",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46728"
},
{
"name": "CVE-2023-53561",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53561"
},
{
"name": "CVE-2026-22998",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22998"
},
{
"name": "CVE-2023-54172",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54172"
},
{
"name": "CVE-2026-23050",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23050"
},
{
"name": "CVE-2024-58100",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58100"
},
{
"name": "CVE-2020-0256",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0256"
},
{
"name": "CVE-2025-21673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21673"
},
{
"name": "CVE-2024-26954",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26954"
},
{
"name": "CVE-2025-21634",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21634"
},
{
"name": "CVE-2024-57999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57999"
},
{
"name": "CVE-2025-38047",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38047"
},
{
"name": "CVE-2024-47738",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47738"
},
{
"name": "CVE-2025-68340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68340"
},
{
"name": "CVE-2024-41013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41013"
},
{
"name": "CVE-2023-54320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54320"
},
{
"name": "CVE-2024-43911",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43911"
},
{
"name": "CVE-2025-37959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37959"
},
{
"name": "CVE-2017-0537",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0537"
},
{
"name": "CVE-2025-38191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38191"
},
{
"name": "CVE-2023-32681",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32681"
},
{
"name": "CVE-2025-68219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68219"
},
{
"name": "CVE-2022-50232",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50232"
},
{
"name": "CVE-2025-38062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38062"
},
{
"name": "CVE-2025-38531",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38531"
},
{
"name": "CVE-2023-26112",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26112"
},
{
"name": "CVE-2018-6952",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-6952"
},
{
"name": "CVE-2020-14304",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14304"
},
{
"name": "CVE-2024-46834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46834"
},
{
"name": "CVE-2025-40288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40288"
},
{
"name": "CVE-2025-68239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68239"
},
{
"name": "CVE-2025-40258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40258"
},
{
"name": "CVE-2025-21894",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21894"
},
{
"name": "CVE-2025-40281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40281"
},
{
"name": "CVE-2025-68185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68185"
},
{
"name": "CVE-2025-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40304"
},
{
"name": "CVE-2025-38503",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38503"
},
{
"name": "CVE-2025-40110",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40110"
},
{
"name": "CVE-2026-24001",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24001"
},
{
"name": "CVE-2025-37807",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37807"
},
{
"name": "CVE-2025-38131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38131"
},
{
"name": "CVE-2022-50016",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50016"
},
{
"name": "CVE-2025-29481",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29481"
},
{
"name": "CVE-2024-53219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53219"
},
{
"name": "CVE-2023-53009",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53009"
},
{
"name": "CVE-2025-40268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40268"
},
{
"name": "CVE-2025-61661",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61661"
},
{
"name": "CVE-2026-23111",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23111"
},
{
"name": "CVE-2024-25740",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25740"
},
{
"name": "CVE-2024-50246",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50246"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2024-57950",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57950"
},
{
"name": "CVE-2025-21759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21759"
},
{
"name": "CVE-2025-40325",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40325"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2024-42321",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42321"
},
{
"name": "CVE-2026-23113",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23113"
},
{
"name": "CVE-2021-0176",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0176"
},
{
"name": "CVE-2025-1151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1151"
},
{
"name": "CVE-2022-48998",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48998"
},
{
"name": "CVE-2025-68798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68798"
},
{
"name": "CVE-2024-42273",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42273"
},
{
"name": "CVE-2025-68336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68336"
},
{
"name": "CVE-2023-53794",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53794"
},
{
"name": "CVE-2026-23157",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23157"
},
{
"name": "CVE-2025-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40303"
},
{
"name": "CVE-2025-68178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68178"
},
{
"name": "CVE-2022-49974",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49974"
},
{
"name": "CVE-2025-40337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40337"
},
{
"name": "CVE-2019-20633",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20633"
},
{
"name": "CVE-2025-38264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38264"
},
{
"name": "CVE-2021-3714",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3714"
},
{
"name": "CVE-2023-54071",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54071"
},
{
"name": "CVE-2024-56566",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56566"
},
{
"name": "CVE-2025-40036",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40036"
},
{
"name": "CVE-2024-57993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57993"
},
{
"name": "CVE-2024-47745",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47745"
},
{
"name": "CVE-2025-39833",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39833"
},
{
"name": "CVE-2026-23097",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23097"
},
{
"name": "CVE-2025-37980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37980"
},
{
"name": "CVE-2024-53190",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53190"
},
{
"name": "CVE-2025-40262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40262"
},
{
"name": "CVE-2024-35784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35784"
},
{
"name": "CVE-2024-56591",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56591"
},
{
"name": "CVE-2024-56544",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56544"
},
{
"name": "CVE-2024-56647",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56647"
},
{
"name": "CVE-2025-71198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71198"
},
{
"name": "CVE-2025-21649",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21649"
},
{
"name": "CVE-2024-57976",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57976"
},
{
"name": "CVE-2025-68819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68819"
},
{
"name": "CVE-2025-0685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0685"
},
{
"name": "CVE-2024-57893",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57893"
},
{
"name": "CVE-2026-23231",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23231"
},
{
"name": "CVE-2025-37879",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37879"
},
{
"name": "CVE-2022-50071",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50071"
},
{
"name": "CVE-2025-40261",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40261"
},
{
"name": "CVE-2024-56180",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56180"
},
{
"name": "CVE-2023-39333",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39333"
},
{
"name": "CVE-2025-38643",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38643"
},
{
"name": "CVE-2021-3864",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3864"
},
{
"name": "CVE-2025-39771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39771"
},
{
"name": "CVE-2023-52591",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52591"
},
{
"name": "CVE-2024-26648",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26648"
},
{
"name": "CVE-2025-66862",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66862"
},
{
"name": "CVE-2020-11868",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11868"
},
{
"name": "CVE-2020-24352",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24352"
},
{
"name": "CVE-2024-36000",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36000"
},
{
"name": "CVE-2026-23021",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23021"
},
{
"name": "CVE-2025-39819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39819"
},
{
"name": "CVE-2022-49296",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49296"
},
{
"name": "CVE-2024-49914",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49914"
},
{
"name": "CVE-2025-38360",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38360"
},
{
"name": "CVE-2025-68732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68732"
},
{
"name": "CVE-2025-39715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39715"
},
{
"name": "CVE-2025-36407",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36407"
},
{
"name": "CVE-2024-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0217"
},
{
"name": "CVE-2025-40323",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40323"
},
{
"name": "CVE-2025-21732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21732"
},
{
"name": "CVE-2021-47658",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47658"
},
{
"name": "CVE-2025-68285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68285"
},
{
"name": "CVE-2019-12067",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12067"
},
{
"name": "CVE-2024-57843",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57843"
},
{
"name": "CVE-2025-38512",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38512"
},
{
"name": "CVE-2024-50135",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50135"
},
{
"name": "CVE-2024-49916",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49916"
},
{
"name": "CVE-2025-68119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68119"
},
{
"name": "CVE-2024-49988",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49988"
},
{
"name": "CVE-2023-52648",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52648"
},
{
"name": "CVE-2024-49861",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49861"
},
{
"name": "CVE-2026-23093",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23093"
},
{
"name": "CVE-2024-49893",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49893"
},
{
"name": "CVE-2024-44963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44963"
},
{
"name": "CVE-2023-53348",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53348"
},
{
"name": "CVE-2022-48766",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48766"
},
{
"name": "CVE-2019-15794",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15794"
},
{
"name": "CVE-2024-49917",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49917"
},
{
"name": "CVE-2022-50467",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50467"
},
{
"name": "CVE-2025-37849",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37849"
},
{
"name": "CVE-2024-48875",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-48875"
},
{
"name": "CVE-2024-41935",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41935"
},
{
"name": "CVE-2025-38162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38162"
},
{
"name": "CVE-2022-23491",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23491"
},
{
"name": "CVE-2025-22873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22873"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2025-71183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71183"
},
{
"name": "CVE-2023-54047",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54047"
},
{
"name": "CVE-2023-53382",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53382"
},
{
"name": "CVE-2024-50060",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50060"
},
{
"name": "CVE-2025-39677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39677"
},
{
"name": "CVE-2023-53651",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53651"
},
{
"name": "CVE-2025-21832",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21832"
},
{
"name": "CVE-2025-68371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68371"
},
{
"name": "CVE-2022-50383",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50383"
},
{
"name": "CVE-2025-39707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39707"
},
{
"name": "CVE-2025-40275",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40275"
},
{
"name": "CVE-2023-53387",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53387"
},
{
"name": "CVE-2026-31802",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31802"
},
{
"name": "CVE-2024-45774",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45774"
},
{
"name": "CVE-2023-54019",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54019"
},
{
"name": "CVE-2025-22053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22053"
},
{
"name": "CVE-2025-61664",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61664"
},
{
"name": "CVE-2025-68211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68211"
},
{
"name": "CVE-2026-25702",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25702"
},
{
"name": "CVE-2023-52452",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52452"
},
{
"name": "CVE-2023-42366",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42366"
},
{
"name": "CVE-2022-50863",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50863"
},
{
"name": "CVE-2025-39829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39829"
},
{
"name": "CVE-2024-35843",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35843"
},
{
"name": "CVE-2025-71091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71091"
},
{
"name": "CVE-2025-39781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39781"
},
{
"name": "CVE-2025-39762",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39762"
},
{
"name": "CVE-2024-40999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40999"
},
{
"name": "CVE-2023-53292",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53292"
},
{
"name": "CVE-2023-52576",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52576"
},
{
"name": "CVE-2024-27002",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27002"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2024-57887",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57887"
},
{
"name": "CVE-2025-21730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21730"
},
{
"name": "CVE-2024-35865",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35865"
},
{
"name": "CVE-2025-71184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71184"
},
{
"name": "CVE-2023-52660",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52660"
},
{
"name": "CVE-2024-35995",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35995"
},
{
"name": "CVE-2025-69420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69420"
},
{
"name": "CVE-2023-53371",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53371"
},
{
"name": "CVE-2025-38659",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38659"
},
{
"name": "CVE-2025-68227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68227"
},
{
"name": "CVE-2025-22041",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22041"
},
{
"name": "CVE-2025-40339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40339"
},
{
"name": "CVE-2025-22127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22127"
},
{
"name": "CVE-2025-47273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47273"
},
{
"name": "CVE-2024-27025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27025"
},
{
"name": "CVE-2025-38020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38020"
},
{
"name": "CVE-2024-27011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27011"
},
{
"name": "CVE-2025-15224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15224"
},
{
"name": "CVE-2024-26605",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26605"
},
{
"name": "CVE-2026-27904",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27904"
},
{
"name": "CVE-2024-38543",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38543"
},
{
"name": "CVE-2025-68263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68263"
},
{
"name": "CVE-2023-53187",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53187"
},
{
"name": "CVE-2025-38689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38689"
},
{
"name": "CVE-2025-68800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68800"
},
{
"name": "CVE-2025-38275",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38275"
},
{
"name": "CVE-2025-68261",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68261"
},
{
"name": "CVE-2022-48744",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48744"
},
{
"name": "CVE-2025-38070",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38070"
},
{
"name": "CVE-2025-68755",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68755"
},
{
"name": "CVE-2025-62525",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62525"
},
{
"name": "CVE-2025-71238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71238"
},
{
"name": "CVE-2021-0175",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0175"
},
{
"name": "CVE-2024-36012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36012"
},
{
"name": "CVE-2022-48706",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48706"
},
{
"name": "CVE-2025-40334",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40334"
},
{
"name": "CVE-2025-68767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68767"
},
{
"name": "CVE-2024-46716",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46716"
},
{
"name": "CVE-2012-4542",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4542"
},
{
"name": "CVE-2021-3773",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3773"
},
{
"name": "CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"name": "CVE-2022-49267",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49267"
},
{
"name": "CVE-2024-56592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56592"
},
{
"name": "CVE-2025-37854",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37854"
},
{
"name": "CVE-2025-38189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38189"
},
{
"name": "CVE-2022-48628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48628"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
},
{
"name": "CVE-2024-50138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50138"
},
{
"name": "CVE-2025-40319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40319"
},
{
"name": "CVE-2021-44534",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44534"
},
{
"name": "CVE-2025-14831",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14831"
},
{
"name": "CVE-2024-56565",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56565"
},
{
"name": "CVE-2025-68193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68193"
},
{
"name": "CVE-2025-68727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68727"
},
{
"name": "CVE-2024-57872",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57872"
},
{
"name": "CVE-2023-28720",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28720"
},
{
"name": "CVE-2024-53093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53093"
},
{
"name": "CVE-2026-23080",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23080"
},
{
"name": "CVE-2024-46833",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46833"
},
{
"name": "CVE-2024-47703",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47703"
},
{
"name": "CVE-2023-53742",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53742"
},
{
"name": "CVE-2025-38361",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38361"
},
{
"name": "CVE-2025-38041",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38041"
},
{
"name": "CVE-2024-53177",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53177"
},
{
"name": "CVE-2024-56588",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56588"
},
{
"name": "CVE-2023-53452",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53452"
},
{
"name": "CVE-2023-54121",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54121"
},
{
"name": "CVE-2023-6610",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6610"
},
{
"name": "CVE-2023-54261",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54261"
},
{
"name": "CVE-2022-50616",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50616"
},
{
"name": "CVE-2025-66418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66418"
},
{
"name": "CVE-2023-53544",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53544"
},
{
"name": "CVE-2025-68264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68264"
},
{
"name": "CVE-2024-49911",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49911"
},
{
"name": "CVE-2026-23154",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23154"
},
{
"name": "CVE-2022-50708",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50708"
},
{
"name": "CVE-2026-3784",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3784"
},
{
"name": "CVE-2025-68764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68764"
},
{
"name": "CVE-2025-9301",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9301"
}
],
"initial_release_date": "2026-03-19T00:00:00",
"last_revision_date": "2026-03-19T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0316",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-03-19T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37219",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37219"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37211",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37211"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37215",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37215"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37218",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37218"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37220",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37220"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37216",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37216"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37221",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37221"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37213",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37213"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37217",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37217"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37212",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37212"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37214",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37214"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37222",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37222"
}
]
}
CERTFR-2026-AVI-0194
Vulnerability from certfr_avis - Published: 2026-02-20 - Updated: 2026-02-20
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Certaines d'entre elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, une atteinte à l'intégrité des données et un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 20.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 24.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 18.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 25.10",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 22.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-40296",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40296"
},
{
"name": "CVE-2025-40225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40225"
},
{
"name": "CVE-2025-40166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40166"
},
{
"name": "CVE-2025-40273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40273"
},
{
"name": "CVE-2025-40064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40064"
},
{
"name": "CVE-2025-38490",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38490"
},
{
"name": "CVE-2025-37850",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37850"
},
{
"name": "CVE-2025-38485",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38485"
},
{
"name": "CVE-2025-22026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22026"
},
{
"name": "CVE-2025-39987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39987"
},
{
"name": "CVE-2025-38579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38579"
},
{
"name": "CVE-2025-68196",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68196"
},
{
"name": "CVE-2025-37761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37761"
},
{
"name": "CVE-2025-21861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21861"
},
{
"name": "CVE-2025-37865",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37865"
},
{
"name": "CVE-2025-38328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38328"
},
{
"name": "CVE-2025-40156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40156"
},
{
"name": "CVE-2025-38711",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38711"
},
{
"name": "CVE-2025-38487",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38487"
},
{
"name": "CVE-2025-40137",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40137"
},
{
"name": "CVE-2025-37775",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37775"
},
{
"name": "CVE-2025-38335",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38335"
},
{
"name": "CVE-2025-38304",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38304"
},
{
"name": "CVE-2025-37892",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37892"
},
{
"name": "CVE-2025-38100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38100"
},
{
"name": "CVE-2025-37859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37859"
},
{
"name": "CVE-2025-40002",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40002"
},
{
"name": "CVE-2025-40057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40057"
},
{
"name": "CVE-2025-38043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38043"
},
{
"name": "CVE-2025-38471",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38471"
},
{
"name": "CVE-2025-38520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38520"
},
{
"name": "CVE-2025-37792",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37792"
},
{
"name": "CVE-2025-68240",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68240"
},
{
"name": "CVE-2025-38108",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38108"
},
{
"name": "CVE-2025-38230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38230"
},
{
"name": "CVE-2025-38229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38229"
},
{
"name": "CVE-2025-40055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40055"
},
{
"name": "CVE-2025-38158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38158"
},
{
"name": "CVE-2025-40151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40151"
},
{
"name": "CVE-2025-37872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37872"
},
{
"name": "CVE-2025-38588",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38588"
},
{
"name": "CVE-2025-39876",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39876"
},
{
"name": "CVE-2025-40314",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40314"
},
{
"name": "CVE-2025-40029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40029"
},
{
"name": "CVE-2025-40037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40037"
},
{
"name": "CVE-2025-38279",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38279"
},
{
"name": "CVE-2025-38561",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38561"
},
{
"name": "CVE-2025-38574",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38574"
},
{
"name": "CVE-2025-40306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40306"
},
{
"name": "CVE-2025-68210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68210"
},
{
"name": "CVE-2025-40239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40239"
},
{
"name": "CVE-2025-40147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40147"
},
{
"name": "CVE-2025-40048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40048"
},
{
"name": "CVE-2025-38147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38147"
},
{
"name": "CVE-2025-23155",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23155"
},
{
"name": "CVE-2025-38286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38286"
},
{
"name": "CVE-2025-40219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40219"
},
{
"name": "CVE-2025-39757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39757"
},
{
"name": "CVE-2025-68200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68200"
},
{
"name": "CVE-2025-38501",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38501"
},
{
"name": "CVE-2025-38474",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38474"
},
{
"name": "CVE-2025-37979",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37979"
},
{
"name": "CVE-2025-40043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40043"
},
{
"name": "CVE-2025-68176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68176"
},
{
"name": "CVE-2025-37777",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37777"
},
{
"name": "CVE-2025-39772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39772"
},
{
"name": "CVE-2025-68199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68199"
},
{
"name": "CVE-2025-37936",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37936"
},
{
"name": "CVE-2025-68204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68204"
},
{
"name": "CVE-2025-38601",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38601"
},
{
"name": "CVE-2025-37766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37766"
},
{
"name": "CVE-2025-38104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38104"
},
{
"name": "CVE-2025-37844",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37844"
},
{
"name": "CVE-2025-21931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21931"
},
{
"name": "CVE-2025-37871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37871"
},
{
"name": "CVE-2025-37778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37778"
},
{
"name": "CVE-2025-39716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39716"
},
{
"name": "CVE-2025-39702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39702"
},
{
"name": "CVE-2025-39973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39973"
},
{
"name": "CVE-2025-38515",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38515"
},
{
"name": "CVE-2025-38645",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38645"
},
{
"name": "CVE-2025-38163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38163"
},
{
"name": "CVE-2025-22126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22126"
},
{
"name": "CVE-2025-38444",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38444"
},
{
"name": "CVE-2025-38109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38109"
},
{
"name": "CVE-2025-39779",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39779"
},
{
"name": "CVE-2025-37755",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37755"
},
{
"name": "CVE-2025-39685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39685"
},
{
"name": "CVE-2025-38660",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38660"
},
{
"name": "CVE-2025-39761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39761"
},
{
"name": "CVE-2025-68246",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68246"
},
{
"name": "CVE-2025-40287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40287"
},
{
"name": "CVE-2025-39943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39943"
},
{
"name": "CVE-2025-39945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39945"
},
{
"name": "CVE-2025-39883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39883"
},
{
"name": "CVE-2025-39720",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39720"
},
{
"name": "CVE-2025-38624",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38624"
},
{
"name": "CVE-2025-40100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40100"
},
{
"name": "CVE-2025-40285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40285"
},
{
"name": "CVE-2025-38388",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38388"
},
{
"name": "CVE-2025-38157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38157"
},
{
"name": "CVE-2025-40063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40063"
},
{
"name": "CVE-2025-37790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37790"
},
{
"name": "CVE-2025-40208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40208"
},
{
"name": "CVE-2025-39746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39746"
},
{
"name": "CVE-2025-38323",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38323"
},
{
"name": "CVE-2025-40019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40019"
},
{
"name": "CVE-2025-40039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40039"
},
{
"name": "CVE-2025-38208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38208"
},
{
"name": "CVE-2025-40240",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40240"
},
{
"name": "CVE-2025-38219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38219"
},
{
"name": "CVE-2025-39889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39889"
},
{
"name": "CVE-2025-38099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38099"
},
{
"name": "CVE-2025-38524",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38524"
},
{
"name": "CVE-2025-38466",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38466"
},
{
"name": "CVE-2025-40117",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40117"
},
{
"name": "CVE-2025-37758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37758"
},
{
"name": "CVE-2025-40081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40081"
},
{
"name": "CVE-2025-38087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38087"
},
{
"name": "CVE-2024-58011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58011"
},
{
"name": "CVE-2025-38039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38039"
},
{
"name": "CVE-2025-40026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40026"
},
{
"name": "CVE-2025-40153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40153"
},
{
"name": "CVE-2025-40103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40103"
},
{
"name": "CVE-2025-40294",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40294"
},
{
"name": "CVE-2025-38595",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38595"
},
{
"name": "CVE-2025-38626",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38626"
},
{
"name": "CVE-2025-40356",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40356"
},
{
"name": "CVE-2025-40121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40121"
},
{
"name": "CVE-2025-40312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40312"
},
{
"name": "CVE-2025-40204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40204"
},
{
"name": "CVE-2025-37852",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37852"
},
{
"name": "CVE-2025-37841",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37841"
},
{
"name": "CVE-2025-40171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40171"
},
{
"name": "CVE-2025-37918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37918"
},
{
"name": "CVE-2025-37917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37917"
},
{
"name": "CVE-2025-38290",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38290"
},
{
"name": "CVE-2025-68243",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68243"
},
{
"name": "CVE-2025-38063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38063"
},
{
"name": "CVE-2025-37770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37770"
},
{
"name": "CVE-2025-37773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37773"
},
{
"name": "CVE-2025-68175",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68175"
},
{
"name": "CVE-2025-40221",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40221"
},
{
"name": "CVE-2025-38578",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38578"
},
{
"name": "CVE-2025-40139",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40139"
},
{
"name": "CVE-2025-40056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40056"
},
{
"name": "CVE-2025-38675",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38675"
},
{
"name": "CVE-2025-39911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39911"
},
{
"name": "CVE-2025-38646",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38646"
},
{
"name": "CVE-2025-38491",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38491"
},
{
"name": "CVE-2025-38708",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38708"
},
{
"name": "CVE-2025-37961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37961"
},
{
"name": "CVE-2025-68248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68248"
},
{
"name": "CVE-2025-40125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40125"
},
{
"name": "CVE-2025-40350",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40350"
},
{
"name": "CVE-2025-40309",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40309"
},
{
"name": "CVE-2025-38313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38313"
},
{
"name": "CVE-2025-38336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38336"
},
{
"name": "CVE-2025-40349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40349"
},
{
"name": "CVE-2025-40052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40052"
},
{
"name": "CVE-2025-38408",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38408"
},
{
"name": "CVE-2025-40343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40343"
},
{
"name": "CVE-2025-38644",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38644"
},
{
"name": "CVE-2025-38692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38692"
},
{
"name": "CVE-2025-38061",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38061"
},
{
"name": "CVE-2025-68173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68173"
},
{
"name": "CVE-2025-37983",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37983"
},
{
"name": "CVE-2025-38127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38127"
},
{
"name": "CVE-2025-38375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38375"
},
{
"name": "CVE-2025-37784",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37784"
},
{
"name": "CVE-2025-39701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39701"
},
{
"name": "CVE-2025-40308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40308"
},
{
"name": "CVE-2025-40187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40187"
},
{
"name": "CVE-2025-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37920"
},
{
"name": "CVE-2025-40315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40315"
},
{
"name": "CVE-2025-37815",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37815"
},
{
"name": "CVE-2025-38686",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38686"
},
{
"name": "CVE-2025-37819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37819"
},
{
"name": "CVE-2025-39913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39913"
},
{
"name": "CVE-2025-40092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40092"
},
{
"name": "CVE-2025-40298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40298"
},
{
"name": "CVE-2025-40355",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40355"
},
{
"name": "CVE-2025-38609",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38609"
},
{
"name": "CVE-2025-68186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68186"
},
{
"name": "CVE-2025-39967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39967"
},
{
"name": "CVE-2025-40054",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40054"
},
{
"name": "CVE-2025-68184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68184"
},
{
"name": "CVE-2024-36357",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36357"
},
{
"name": "CVE-2025-38463",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38463"
},
{
"name": "CVE-2025-40115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40115"
},
{
"name": "CVE-2025-38112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38112"
},
{
"name": "CVE-2025-38521",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38521"
},
{
"name": "CVE-2025-38023",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38023"
},
{
"name": "CVE-2025-39709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39709"
},
{
"name": "CVE-2025-38282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38282"
},
{
"name": "CVE-2025-39689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39689"
},
{
"name": "CVE-2025-38215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38215"
},
{
"name": "CVE-2025-39787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39787"
},
{
"name": "CVE-2025-37943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37943"
},
{
"name": "CVE-2025-37745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37745"
},
{
"name": "CVE-2025-40058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40058"
},
{
"name": "CVE-2025-39731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39731"
},
{
"name": "CVE-2025-38734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38734"
},
{
"name": "CVE-2025-38653",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38653"
},
{
"name": "CVE-2025-38571",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38571"
},
{
"name": "CVE-2025-37789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37789"
},
{
"name": "CVE-2025-40347",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40347"
},
{
"name": "CVE-2025-38695",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38695"
},
{
"name": "CVE-2025-38004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38004"
},
{
"name": "CVE-2025-39749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39749"
},
{
"name": "CVE-2025-40198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40198"
},
{
"name": "CVE-2025-68310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68310"
},
{
"name": "CVE-2025-68179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68179"
},
{
"name": "CVE-2025-40145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40145"
},
{
"name": "CVE-2025-39949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39949"
},
{
"name": "CVE-2025-38387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38387"
},
{
"name": "CVE-2025-68169",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68169"
},
{
"name": "CVE-2025-38362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38362"
},
{
"name": "CVE-2025-40173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40173"
},
{
"name": "CVE-2025-68316",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68316"
},
{
"name": "CVE-2025-68321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68321"
},
{
"name": "CVE-2025-37924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37924"
},
{
"name": "CVE-2025-40004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40004"
},
{
"name": "CVE-2025-38371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38371"
},
{
"name": "CVE-2024-56538",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56538"
},
{
"name": "CVE-2025-39923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39923"
},
{
"name": "CVE-2025-38445",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38445"
},
{
"name": "CVE-2025-38456",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38456"
},
{
"name": "CVE-2025-38538",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38538"
},
{
"name": "CVE-2025-37867",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37867"
},
{
"name": "CVE-2025-23160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23160"
},
{
"name": "CVE-2025-40311",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40311"
},
{
"name": "CVE-2025-38295",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38295"
},
{
"name": "CVE-2025-38461",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38461"
},
{
"name": "CVE-2025-37857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37857"
},
{
"name": "CVE-2025-37842",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37842"
},
{
"name": "CVE-2025-40237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40237"
},
{
"name": "CVE-2025-39953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39953"
},
{
"name": "CVE-2025-38710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38710"
},
{
"name": "CVE-2025-39681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39681"
},
{
"name": "CVE-2025-38060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38060"
},
{
"name": "CVE-2025-40167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40167"
},
{
"name": "CVE-2025-38159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38159"
},
{
"name": "CVE-2025-38066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38066"
},
{
"name": "CVE-2025-39770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39770"
},
{
"name": "CVE-2025-39969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39969"
},
{
"name": "CVE-2025-37744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37744"
},
{
"name": "CVE-2025-38705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38705"
},
{
"name": "CVE-2025-40194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40194"
},
{
"name": "CVE-2025-38706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38706"
},
{
"name": "CVE-2025-40333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40333"
},
{
"name": "CVE-2025-38305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38305"
},
{
"name": "CVE-2025-37884",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37884"
},
{
"name": "CVE-2025-38067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38067"
},
{
"name": "CVE-2025-39750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39750"
},
{
"name": "CVE-2025-38699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38699"
},
{
"name": "CVE-2025-37927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37927"
},
{
"name": "CVE-2025-38707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38707"
},
{
"name": "CVE-2025-38562",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38562"
},
{
"name": "CVE-2025-37897",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37897"
},
{
"name": "CVE-2025-40256",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40256"
},
{
"name": "CVE-2025-37911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37911"
},
{
"name": "CVE-2025-40245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40245"
},
{
"name": "CVE-2025-38587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38587"
},
{
"name": "CVE-2025-37869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37869"
},
{
"name": "CVE-2025-39692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39692"
},
{
"name": "CVE-2025-40360",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40360"
},
{
"name": "CVE-2025-40332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40332"
},
{
"name": "CVE-2025-40082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40082"
},
{
"name": "CVE-2025-38068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38068"
},
{
"name": "CVE-2025-38436",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38436"
},
{
"name": "CVE-2025-37930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37930"
},
{
"name": "CVE-2025-40104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40104"
},
{
"name": "CVE-2025-38401",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38401"
},
{
"name": "CVE-2025-38677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38677"
},
{
"name": "CVE-2025-38097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38097"
},
{
"name": "CVE-2025-37810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37810"
},
{
"name": "CVE-2025-38253",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38253"
},
{
"name": "CVE-2025-40097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40097"
},
{
"name": "CVE-2025-38123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38123"
},
{
"name": "CVE-2025-38338",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38338"
},
{
"name": "CVE-2025-38555",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38555"
},
{
"name": "CVE-2025-38239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38239"
},
{
"name": "CVE-2025-40001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40001"
},
{
"name": "CVE-2025-38590",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38590"
},
{
"name": "CVE-2025-38027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38027"
},
{
"name": "CVE-2025-38102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38102"
},
{
"name": "CVE-2025-40035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40035"
},
{
"name": "CVE-2025-68187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68187"
},
{
"name": "CVE-2025-38283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38283"
},
{
"name": "CVE-2025-40322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40322"
},
{
"name": "CVE-2025-68209",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68209"
},
{
"name": "CVE-2025-40045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40045"
},
{
"name": "CVE-2025-23159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23159"
},
{
"name": "CVE-2025-39988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39988"
},
{
"name": "CVE-2025-38455",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38455"
},
{
"name": "CVE-2025-40313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40313"
},
{
"name": "CVE-2025-40089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40089"
},
{
"name": "CVE-2025-38584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38584"
},
{
"name": "CVE-2025-38015",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38015"
},
{
"name": "CVE-2025-39675",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39675"
},
{
"name": "CVE-2025-39679",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39679"
},
{
"name": "CVE-2025-38527",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38527"
},
{
"name": "CVE-2025-38449",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38449"
},
{
"name": "CVE-2025-40233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40233"
},
{
"name": "CVE-2025-40172",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40172"
},
{
"name": "CVE-2025-37853",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37853"
},
{
"name": "CVE-2025-38126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38126"
},
{
"name": "CVE-2025-38149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38149"
},
{
"name": "CVE-2025-39763",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39763"
},
{
"name": "CVE-2025-38399",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38399"
},
{
"name": "CVE-2025-40020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40020"
},
{
"name": "CVE-2025-38065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38065"
},
{
"name": "CVE-2025-38693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38693"
},
{
"name": "CVE-2025-38679",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38679"
},
{
"name": "CVE-2025-38459",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38459"
},
{
"name": "CVE-2025-40188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40188"
},
{
"name": "CVE-2025-40271",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40271"
},
{
"name": "CVE-2025-40291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40291"
},
{
"name": "CVE-2025-38685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38685"
},
{
"name": "CVE-2025-40359",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40359"
},
{
"name": "CVE-2025-38412",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38412"
},
{
"name": "CVE-2025-38031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38031"
},
{
"name": "CVE-2025-40186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40186"
},
{
"name": "CVE-2025-38293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38293"
},
{
"name": "CVE-2025-40073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40073"
},
{
"name": "CVE-2025-38648",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38648"
},
{
"name": "CVE-2025-38278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38278"
},
{
"name": "CVE-2025-37764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37764"
},
{
"name": "CVE-2025-38184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38184"
},
{
"name": "CVE-2025-37741",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37741"
},
{
"name": "CVE-2025-38053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38053"
},
{
"name": "CVE-2025-40242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40242"
},
{
"name": "CVE-2025-37822",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37822"
},
{
"name": "CVE-2025-37912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37912"
},
{
"name": "CVE-2025-38482",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38482"
},
{
"name": "CVE-2025-37820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37820"
},
{
"name": "CVE-2025-68198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68198"
},
{
"name": "CVE-2025-37985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37985"
},
{
"name": "CVE-2025-68314",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68314"
},
{
"name": "CVE-2025-38634",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38634"
},
{
"name": "CVE-2025-40212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40212"
},
{
"name": "CVE-2025-37787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37787"
},
{
"name": "CVE-2025-38008",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38008"
},
{
"name": "CVE-2025-38458",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38458"
},
{
"name": "CVE-2025-39730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39730"
},
{
"name": "CVE-2025-38011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38011"
},
{
"name": "CVE-2025-68190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68190"
},
{
"name": "CVE-2025-38034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38034"
},
{
"name": "CVE-2025-40086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40086"
},
{
"name": "CVE-2025-68242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68242"
},
{
"name": "CVE-2025-38135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38135"
},
{
"name": "CVE-2025-38619",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38619"
},
{
"name": "CVE-2025-40169",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40169"
},
{
"name": "CVE-2025-38312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38312"
},
{
"name": "CVE-2025-38095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38095"
},
{
"name": "CVE-2025-37878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37878"
},
{
"name": "CVE-2025-39737",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39737"
},
{
"name": "CVE-2025-38464",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38464"
},
{
"name": "CVE-2025-40049",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40049"
},
{
"name": "CVE-2025-68322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68322"
},
{
"name": "CVE-2025-38363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38363"
},
{
"name": "CVE-2025-38702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38702"
},
{
"name": "CVE-2025-38319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38319"
},
{
"name": "CVE-2022-49698",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49698"
},
{
"name": "CVE-2025-40238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40238"
},
{
"name": "CVE-2025-38724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38724"
},
{
"name": "CVE-2025-68205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68205"
},
{
"name": "CVE-2025-40277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40277"
},
{
"name": "CVE-2025-40070",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40070"
},
{
"name": "CVE-2025-38250",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38250"
},
{
"name": "CVE-2025-38457",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38457"
},
{
"name": "CVE-2025-38582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38582"
},
{
"name": "CVE-2025-37813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37813"
},
{
"name": "CVE-2025-38543",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38543"
},
{
"name": "CVE-2025-38698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38698"
},
{
"name": "CVE-2025-38212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38212"
},
{
"name": "CVE-2025-40106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40106"
},
{
"name": "CVE-2025-68174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68174"
},
{
"name": "CVE-2025-38298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38298"
},
{
"name": "CVE-2025-40272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40272"
},
{
"name": "CVE-2025-39739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39739"
},
{
"name": "CVE-2025-38024",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38024"
},
{
"name": "CVE-2025-40047",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40047"
},
{
"name": "CVE-2025-38496",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38496"
},
{
"name": "CVE-2025-38078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38078"
},
{
"name": "CVE-2025-38419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38419"
},
{
"name": "CVE-2025-40136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40136"
},
{
"name": "CVE-2025-38533",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38533"
},
{
"name": "CVE-2025-40344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40344"
},
{
"name": "CVE-2025-40205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40205"
},
{
"name": "CVE-2025-40354",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40354"
},
{
"name": "CVE-2025-38169",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38169"
},
{
"name": "CVE-2025-37931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37931"
},
{
"name": "CVE-2025-38511",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38511"
},
{
"name": "CVE-2025-38537",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38537"
},
{
"name": "CVE-2025-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38546"
},
{
"name": "CVE-2025-38211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38211"
},
{
"name": "CVE-2025-40033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40033"
},
{
"name": "CVE-2025-38057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38057"
},
{
"name": "CVE-2025-40122",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40122"
},
{
"name": "CVE-2025-68188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68188"
},
{
"name": "CVE-2025-40269",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40269"
},
{
"name": "CVE-2025-37887",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37887"
},
{
"name": "CVE-2025-38077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38077"
},
{
"name": "CVE-2025-38251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38251"
},
{
"name": "CVE-2025-37861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37861"
},
{
"name": "CVE-2025-68319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68319"
},
{
"name": "CVE-2025-40119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40119"
},
{
"name": "CVE-2025-38120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38120"
},
{
"name": "CVE-2025-38285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38285"
},
{
"name": "CVE-2025-39743",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39743"
},
{
"name": "CVE-2025-39718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39718"
},
{
"name": "CVE-2025-37938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37938"
},
{
"name": "CVE-2025-38005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38005"
},
{
"name": "CVE-2025-38368",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38368"
},
{
"name": "CVE-2025-40075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40075"
},
{
"name": "CVE-2025-38161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38161"
},
{
"name": "CVE-2025-38331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38331"
},
{
"name": "CVE-2025-38354",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38354"
},
{
"name": "CVE-2025-40138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40138"
},
{
"name": "CVE-2025-38712",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38712"
},
{
"name": "CVE-2025-38732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38732"
},
{
"name": "CVE-2025-39773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39773"
},
{
"name": "CVE-2025-38696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38696"
},
{
"name": "CVE-2025-40143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40143"
},
{
"name": "CVE-2025-68189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68189"
},
{
"name": "CVE-2025-38274",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38274"
},
{
"name": "CVE-2025-40076",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40076"
},
{
"name": "CVE-2025-40027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40027"
},
{
"name": "CVE-2025-39885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39885"
},
{
"name": "CVE-2025-68180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68180"
},
{
"name": "CVE-2025-37874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37874"
},
{
"name": "CVE-2025-38115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38115"
},
{
"name": "CVE-2025-38632",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38632"
},
{
"name": "CVE-2025-37988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37988"
},
{
"name": "CVE-2025-23158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23158"
},
{
"name": "CVE-2025-23144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23144"
},
{
"name": "CVE-2025-38153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38153"
},
{
"name": "CVE-2025-37969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37969"
},
{
"name": "CVE-2025-38548",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38548"
},
{
"name": "CVE-2025-37816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37816"
},
{
"name": "CVE-2025-40362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40362"
},
{
"name": "CVE-2025-37742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37742"
},
{
"name": "CVE-2025-68201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68201"
},
{
"name": "CVE-2025-40289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40289"
},
{
"name": "CVE-2025-37765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37765"
},
{
"name": "CVE-2025-38395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38395"
},
{
"name": "CVE-2025-37921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37921"
},
{
"name": "CVE-2025-38507",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38507"
},
{
"name": "CVE-2025-40230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40230"
},
{
"name": "CVE-2025-39989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39989"
},
{
"name": "CVE-2025-38337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38337"
},
{
"name": "CVE-2025-38014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38014"
},
{
"name": "CVE-2025-38258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38258"
},
{
"name": "CVE-2025-37828",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37828"
},
{
"name": "CVE-2025-37769",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37769"
},
{
"name": "CVE-2025-38465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38465"
},
{
"name": "CVE-2025-38513",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38513"
},
{
"name": "CVE-2025-39970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39970"
},
{
"name": "CVE-2025-40292",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40292"
},
{
"name": "CVE-2025-38086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38086"
},
{
"name": "CVE-2025-68181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68181"
},
{
"name": "CVE-2025-37935",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37935"
},
{
"name": "CVE-2025-40032",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40032"
},
{
"name": "CVE-2025-38396",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38396"
},
{
"name": "CVE-2025-23161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23161"
},
{
"name": "CVE-2025-38407",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38407"
},
{
"name": "CVE-2025-39994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39994"
},
{
"name": "CVE-2025-38493",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38493"
},
{
"name": "CVE-2025-37803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37803"
},
{
"name": "CVE-2025-40228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40228"
},
{
"name": "CVE-2025-40150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40150"
},
{
"name": "CVE-2025-38670",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38670"
},
{
"name": "CVE-2025-39732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39732"
},
{
"name": "CVE-2025-37824",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37824"
},
{
"name": "CVE-2025-40274",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40274"
},
{
"name": "CVE-2025-38602",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38602"
},
{
"name": "CVE-2025-38003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38003"
},
{
"name": "CVE-2025-38441",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38441"
},
{
"name": "CVE-2025-40206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40206"
},
{
"name": "CVE-2025-40218",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40218"
},
{
"name": "CVE-2025-38007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38007"
},
{
"name": "CVE-2025-37923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37923"
},
{
"name": "CVE-2025-40088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40088"
},
{
"name": "CVE-2025-40220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40220"
},
{
"name": "CVE-2025-38142",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38142"
},
{
"name": "CVE-2025-37739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37739"
},
{
"name": "CVE-2025-38478",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38478"
},
{
"name": "CVE-2025-38568",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38568"
},
{
"name": "CVE-2025-38583",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38583"
},
{
"name": "CVE-2025-39788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39788"
},
{
"name": "CVE-2025-22058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22058"
},
{
"name": "CVE-2025-37831",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37831"
},
{
"name": "CVE-2025-38499",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38499"
},
{
"name": "CVE-2025-68312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68312"
},
{
"name": "CVE-2025-40062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40062"
},
{
"name": "CVE-2025-68194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68194"
},
{
"name": "CVE-2025-38269",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38269"
},
{
"name": "CVE-2025-38079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38079"
},
{
"name": "CVE-2025-37940",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37940"
},
{
"name": "CVE-2025-40336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40336"
},
{
"name": "CVE-2025-37945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37945"
},
{
"name": "CVE-2025-40067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40067"
},
{
"name": "CVE-2025-40109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40109"
},
{
"name": "CVE-2025-40101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40101"
},
{
"name": "CVE-2025-38735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38735"
},
{
"name": "CVE-2025-40006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40006"
},
{
"name": "CVE-2025-68251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68251"
},
{
"name": "CVE-2025-38652",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38652"
},
{
"name": "CVE-2025-38110",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38110"
},
{
"name": "CVE-2025-38422",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38422"
},
{
"name": "CVE-2025-38402",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38402"
},
{
"name": "CVE-2025-39698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39698"
},
{
"name": "CVE-2025-40038",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40038"
},
{
"name": "CVE-2025-37915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37915"
},
{
"name": "CVE-2025-68183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68183"
},
{
"name": "CVE-2025-23146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23146"
},
{
"name": "CVE-2025-37903",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37903"
},
{
"name": "CVE-2025-40353",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40353"
},
{
"name": "CVE-2025-40222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40222"
},
{
"name": "CVE-2025-23142",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23142"
},
{
"name": "CVE-2025-37738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37738"
},
{
"name": "CVE-2025-40011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40011"
},
{
"name": "CVE-2025-38303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38303"
},
{
"name": "CVE-2025-38074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38074"
},
{
"name": "CVE-2025-40085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40085"
},
{
"name": "CVE-2025-38119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38119"
},
{
"name": "CVE-2025-38232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38232"
},
{
"name": "CVE-2025-38245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38245"
},
{
"name": "CVE-2025-40184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40184"
},
{
"name": "CVE-2025-68244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68244"
},
{
"name": "CVE-2025-40231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40231"
},
{
"name": "CVE-2025-38324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38324"
},
{
"name": "CVE-2025-40278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40278"
},
{
"name": "CVE-2025-38018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38018"
},
{
"name": "CVE-2025-40176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40176"
},
{
"name": "CVE-2025-40342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40342"
},
{
"name": "CVE-2025-37830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37830"
},
{
"name": "CVE-2025-38614",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38614"
},
{
"name": "CVE-2025-37991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37991"
},
{
"name": "CVE-2025-38425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38425"
},
{
"name": "CVE-2025-40210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40210"
},
{
"name": "CVE-2025-37978",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37978"
},
{
"name": "CVE-2025-37781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37781"
},
{
"name": "CVE-2025-38210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38210"
},
{
"name": "CVE-2025-38542",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38542"
},
{
"name": "CVE-2025-38664",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38664"
},
{
"name": "CVE-2025-38344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38344"
},
{
"name": "CVE-2025-23145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23145"
},
{
"name": "CVE-2025-23143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23143"
},
{
"name": "CVE-2025-38322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38322"
},
{
"name": "CVE-2025-38088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38088"
},
{
"name": "CVE-2025-23141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23141"
},
{
"name": "CVE-2025-40193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40193"
},
{
"name": "CVE-2025-37823",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37823"
},
{
"name": "CVE-2025-38332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38332"
},
{
"name": "CVE-2025-40148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40148"
},
{
"name": "CVE-2025-40326",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40326"
},
{
"name": "CVE-2025-38386",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38386"
},
{
"name": "CVE-2025-40279",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40279"
},
{
"name": "CVE-2025-38385",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38385"
},
{
"name": "CVE-2025-40201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40201"
},
{
"name": "CVE-2025-37952",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37952"
},
{
"name": "CVE-2025-38694",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38694"
},
{
"name": "CVE-2025-37793",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37793"
},
{
"name": "CVE-2025-40084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40084"
},
{
"name": "CVE-2025-68311",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68311"
},
{
"name": "CVE-2025-37740",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37740"
},
{
"name": "CVE-2025-38676",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38676"
},
{
"name": "CVE-2025-38530",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38530"
},
{
"name": "CVE-2025-38174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38174"
},
{
"name": "CVE-2025-37826",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37826"
},
{
"name": "CVE-2025-37986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37986"
},
{
"name": "CVE-2025-37829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37829"
},
{
"name": "CVE-2025-68320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68320"
},
{
"name": "CVE-2025-40341",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40341"
},
{
"name": "CVE-2025-38409",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38409"
},
{
"name": "CVE-2025-40199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40199"
},
{
"name": "CVE-2025-40183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40183"
},
{
"name": "CVE-2025-38019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38019"
},
{
"name": "CVE-2025-38729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38729"
},
{
"name": "CVE-2025-68172",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68172"
},
{
"name": "CVE-2025-23151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23151"
},
{
"name": "CVE-2025-38037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38037"
},
{
"name": "CVE-2025-39998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39998"
},
{
"name": "CVE-2025-40338",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40338"
},
{
"name": "CVE-2025-40195",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40195"
},
{
"name": "CVE-2025-37796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37796"
},
{
"name": "CVE-2025-37962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37962"
},
{
"name": "CVE-2025-40134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40134"
},
{
"name": "CVE-2025-38681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38681"
},
{
"name": "CVE-2025-37799",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37799"
},
{
"name": "CVE-2025-38593",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38593"
},
{
"name": "CVE-2025-39968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39968"
},
{
"name": "CVE-2025-38342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38342"
},
{
"name": "CVE-2025-39795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39795"
},
{
"name": "CVE-2025-37801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37801"
},
{
"name": "CVE-2025-38167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38167"
},
{
"name": "CVE-2025-37883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37883"
},
{
"name": "CVE-2025-40302",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40302"
},
{
"name": "CVE-2025-37863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37863"
},
{
"name": "CVE-2025-37901",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37901"
},
{
"name": "CVE-2025-38687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38687"
},
{
"name": "CVE-2025-40358",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40358"
},
{
"name": "CVE-2025-37811",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37811"
},
{
"name": "CVE-2025-40165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40165"
},
{
"name": "CVE-2025-38257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38257"
},
{
"name": "CVE-2025-68318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68318"
},
{
"name": "CVE-2025-37864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37864"
},
{
"name": "CVE-2025-38307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38307"
},
{
"name": "CVE-2025-40161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40161"
},
{
"name": "CVE-2025-40357",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40357"
},
{
"name": "CVE-2025-40328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40328"
},
{
"name": "CVE-2025-37916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37916"
},
{
"name": "CVE-2025-40340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40340"
},
{
"name": "CVE-2025-38111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38111"
},
{
"name": "CVE-2025-39986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39986"
},
{
"name": "CVE-2025-37767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37767"
},
{
"name": "CVE-2025-40283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40283"
},
{
"name": "CVE-2025-39955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39955"
},
{
"name": "CVE-2025-40324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40324"
},
{
"name": "CVE-2025-37989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37989"
},
{
"name": "CVE-2025-38529",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38529"
},
{
"name": "CVE-2025-40131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40131"
},
{
"name": "CVE-2025-40146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40146"
},
{
"name": "CVE-2025-38326",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38326"
},
{
"name": "CVE-2025-40177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40177"
},
{
"name": "CVE-2025-38055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38055"
},
{
"name": "CVE-2025-38129",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38129"
},
{
"name": "CVE-2025-38384",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38384"
},
{
"name": "CVE-2025-38334",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38334"
},
{
"name": "CVE-2025-38728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38728"
},
{
"name": "CVE-2025-38424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38424"
},
{
"name": "CVE-2025-38430",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38430"
},
{
"name": "CVE-2025-38715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38715"
},
{
"name": "CVE-2025-39734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39734"
},
{
"name": "CVE-2025-38089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38089"
},
{
"name": "CVE-2025-40226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40226"
},
{
"name": "CVE-2025-40078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40078"
},
{
"name": "CVE-2025-38382",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38382"
},
{
"name": "CVE-2025-40074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40074"
},
{
"name": "CVE-2025-38608",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38608"
},
{
"name": "CVE-2025-40321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40321"
},
{
"name": "CVE-2025-38650",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38650"
},
{
"name": "CVE-2025-40069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40069"
},
{
"name": "CVE-2025-39710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39710"
},
{
"name": "CVE-2025-40116",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40116"
},
{
"name": "CVE-2025-68249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68249"
},
{
"name": "CVE-2025-38124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38124"
},
{
"name": "CVE-2025-39934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39934"
},
{
"name": "CVE-2025-37925",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37925"
},
{
"name": "CVE-2025-40158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40158"
},
{
"name": "CVE-2025-39683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39683"
},
{
"name": "CVE-2025-38420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38420"
},
{
"name": "CVE-2025-38071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38071"
},
{
"name": "CVE-2025-40327",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40327"
},
{
"name": "CVE-2025-40130",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40130"
},
{
"name": "CVE-2025-40179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40179"
},
{
"name": "CVE-2025-37972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37972"
},
{
"name": "CVE-2025-38183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38183"
},
{
"name": "CVE-2025-40127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40127"
},
{
"name": "CVE-2025-37768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37768"
},
{
"name": "CVE-2025-40282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40282"
},
{
"name": "CVE-2025-39794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39794"
},
{
"name": "CVE-2025-38160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38160"
},
{
"name": "CVE-2025-37984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37984"
},
{
"name": "CVE-2025-38528",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38528"
},
{
"name": "CVE-2025-39996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39996"
},
{
"name": "CVE-2025-40168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40168"
},
{
"name": "CVE-2025-37856",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37856"
},
{
"name": "CVE-2025-38107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38107"
},
{
"name": "CVE-2025-38292",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38292"
},
{
"name": "CVE-2025-40053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40053"
},
{
"name": "CVE-2025-38085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38085"
},
{
"name": "CVE-2025-38222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38222"
},
{
"name": "CVE-2025-38010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38010"
},
{
"name": "CVE-2025-38197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38197"
},
{
"name": "CVE-2025-39951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39951"
},
{
"name": "CVE-2025-38468",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38468"
},
{
"name": "CVE-2025-40120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40120"
},
{
"name": "CVE-2025-40185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40185"
},
{
"name": "CVE-2025-38688",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38688"
},
{
"name": "CVE-2025-38333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38333"
},
{
"name": "CVE-2025-40295",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40295"
},
{
"name": "CVE-2025-68192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68192"
},
{
"name": "CVE-2025-37970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37970"
},
{
"name": "CVE-2025-21884",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21884"
},
{
"name": "CVE-2025-37905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37905"
},
{
"name": "CVE-2025-38390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38390"
},
{
"name": "CVE-2025-38013",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38013"
},
{
"name": "CVE-2025-40098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40098"
},
{
"name": "CVE-2025-38059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38059"
},
{
"name": "CVE-2025-38713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38713"
},
{
"name": "CVE-2025-37956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37956"
},
{
"name": "CVE-2025-40243",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40243"
},
{
"name": "CVE-2025-40196",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40196"
},
{
"name": "CVE-2025-38148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38148"
},
{
"name": "CVE-2025-40129",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40129"
},
{
"name": "CVE-2025-38467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38467"
},
{
"name": "CVE-2025-38117",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38117"
},
{
"name": "CVE-2025-38094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38094"
},
{
"name": "CVE-2025-68171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68171"
},
{
"name": "CVE-2025-38072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38072"
},
{
"name": "CVE-2025-37967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37967"
},
{
"name": "CVE-2025-40301",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40301"
},
{
"name": "CVE-2025-38300",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38300"
},
{
"name": "CVE-2025-40040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40040"
},
{
"name": "CVE-2025-38289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38289"
},
{
"name": "CVE-2025-39782",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39782"
},
{
"name": "CVE-2025-68207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68207"
},
{
"name": "CVE-2025-40066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40066"
},
{
"name": "CVE-2025-38075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38075"
},
{
"name": "CVE-2025-37885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37885"
},
{
"name": "CVE-2025-38697",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38697"
},
{
"name": "CVE-2025-37949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37949"
},
{
"name": "CVE-2025-68167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68167"
},
{
"name": "CVE-2025-38691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38691"
},
{
"name": "CVE-2025-40207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40207"
},
{
"name": "CVE-2025-38373",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38373"
},
{
"name": "CVE-2025-38489",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38489"
},
{
"name": "CVE-2025-40095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40095"
},
{
"name": "CVE-2025-37957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37957"
},
{
"name": "CVE-2025-38058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38058"
},
{
"name": "CVE-2025-38483",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38483"
},
{
"name": "CVE-2025-38369",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38369"
},
{
"name": "CVE-2025-39759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39759"
},
{
"name": "CVE-2025-38639",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38639"
},
{
"name": "CVE-2025-38122",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38122"
},
{
"name": "CVE-2025-38612",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38612"
},
{
"name": "CVE-2025-40299",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40299"
},
{
"name": "CVE-2025-38173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38173"
},
{
"name": "CVE-2025-40286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40286"
},
{
"name": "CVE-2025-38143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38143"
},
{
"name": "CVE-2025-38098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38098"
},
{
"name": "CVE-2025-40091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40091"
},
{
"name": "CVE-2025-40318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40318"
},
{
"name": "CVE-2025-38566",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38566"
},
{
"name": "CVE-2025-39721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39721"
},
{
"name": "CVE-2025-68241",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68241"
},
{
"name": "CVE-2025-39760",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39760"
},
{
"name": "CVE-2025-40118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40118"
},
{
"name": "CVE-2025-38718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38718"
},
{
"name": "CVE-2025-38392",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38392"
},
{
"name": "CVE-2025-39673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39673"
},
{
"name": "CVE-2025-38259",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38259"
},
{
"name": "CVE-2025-38663",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38663"
},
{
"name": "CVE-2025-40021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40021"
},
{
"name": "CVE-2025-40135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40135"
},
{
"name": "CVE-2025-38156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38156"
},
{
"name": "CVE-2025-37951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37951"
},
{
"name": "CVE-2025-37840",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37840"
},
{
"name": "CVE-2025-68253",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68253"
},
{
"name": "CVE-2025-68734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68734"
},
{
"name": "CVE-2025-37947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37947"
},
{
"name": "CVE-2025-38416",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38416"
},
{
"name": "CVE-2025-37846",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37846"
},
{
"name": "CVE-2025-38722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38722"
},
{
"name": "CVE-2025-38192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38192"
},
{
"name": "CVE-2025-39800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39800"
},
{
"name": "CVE-2025-40044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40044"
},
{
"name": "CVE-2025-38343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38343"
},
{
"name": "CVE-2025-40105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40105"
},
{
"name": "CVE-2025-38202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38202"
},
{
"name": "CVE-2025-40050",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40050"
},
{
"name": "CVE-2025-40072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40072"
},
{
"name": "CVE-2025-40112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40112"
},
{
"name": "CVE-2025-40079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40079"
},
{
"name": "CVE-2025-22101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22101"
},
{
"name": "CVE-2025-38374",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38374"
},
{
"name": "CVE-2025-39703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39703"
},
{
"name": "CVE-2025-38194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38194"
},
{
"name": "CVE-2025-68182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68182"
},
{
"name": "CVE-2025-38549",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38549"
},
{
"name": "CVE-2025-40310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40310"
},
{
"name": "CVE-2025-38665",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38665"
},
{
"name": "CVE-2025-38101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38101"
},
{
"name": "CVE-2025-37982",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37982"
},
{
"name": "CVE-2025-37992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37992"
},
{
"name": "CVE-2025-38577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38577"
},
{
"name": "CVE-2025-38671",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38671"
},
{
"name": "CVE-2025-68317",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68317"
},
{
"name": "CVE-2025-39971",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39971"
},
{
"name": "CVE-2025-38299",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38299"
},
{
"name": "CVE-2025-40154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40154"
},
{
"name": "CVE-2025-40331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40331"
},
{
"name": "CVE-2025-38635",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38635"
},
{
"name": "CVE-2025-38704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38704"
},
{
"name": "CVE-2025-38348",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38348"
},
{
"name": "CVE-2025-40270",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40270"
},
{
"name": "CVE-2025-40191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40191"
},
{
"name": "CVE-2025-38488",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38488"
},
{
"name": "CVE-2025-40189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40189"
},
{
"name": "CVE-2025-40093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40093"
},
{
"name": "CVE-2025-38540",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38540"
},
{
"name": "CVE-2025-38040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38040"
},
{
"name": "CVE-2025-38265",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38265"
},
{
"name": "CVE-2025-23149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23149"
},
{
"name": "CVE-2025-38403",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38403"
},
{
"name": "CVE-2025-21726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21726"
},
{
"name": "CVE-2025-38552",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38552"
},
{
"name": "CVE-2025-40335",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40335"
},
{
"name": "CVE-2025-40149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40149"
},
{
"name": "CVE-2025-37914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37914"
},
{
"name": "CVE-2025-40164",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40164"
},
{
"name": "CVE-2025-37873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37873"
},
{
"name": "CVE-2025-37928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37928"
},
{
"name": "CVE-2025-40267",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40267"
},
{
"name": "CVE-2025-40235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40235"
},
{
"name": "CVE-2025-39766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39766"
},
{
"name": "CVE-2025-39801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39801"
},
{
"name": "CVE-2025-37922",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37922"
},
{
"name": "CVE-2025-38146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38146"
},
{
"name": "CVE-2025-68208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68208"
},
{
"name": "CVE-2025-39724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39724"
},
{
"name": "CVE-2025-39687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39687"
},
{
"name": "CVE-2025-37794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37794"
},
{
"name": "CVE-2025-38510",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38510"
},
{
"name": "CVE-2025-38246",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38246"
},
{
"name": "CVE-2025-39758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39758"
},
{
"name": "CVE-2025-39694",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39694"
},
{
"name": "CVE-2025-38220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38220"
},
{
"name": "CVE-2025-38405",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38405"
},
{
"name": "CVE-2025-38418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38418"
},
{
"name": "CVE-2025-40352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40352"
},
{
"name": "CVE-2025-38090",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38090"
},
{
"name": "CVE-2025-38429",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38429"
},
{
"name": "CVE-2025-38225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38225"
},
{
"name": "CVE-2025-40280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40280"
},
{
"name": "CVE-2025-38155",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38155"
},
{
"name": "CVE-2025-40099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40099"
},
{
"name": "CVE-2025-71162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71162"
},
{
"name": "CVE-2025-37977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37977"
},
{
"name": "CVE-2025-38365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38365"
},
{
"name": "CVE-2025-38415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38415"
},
{
"name": "CVE-2025-40031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40031"
},
{
"name": "CVE-2025-40180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40180"
},
{
"name": "CVE-2025-40293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40293"
},
{
"name": "CVE-2025-38668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38668"
},
{
"name": "CVE-2025-37973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37973"
},
{
"name": "CVE-2025-40330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40330"
},
{
"name": "CVE-2025-68750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68750"
},
{
"name": "CVE-2025-38260",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38260"
},
{
"name": "CVE-2025-37827",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37827"
},
{
"name": "CVE-2025-38721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38721"
},
{
"name": "CVE-2025-38244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38244"
},
{
"name": "CVE-2025-38080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38080"
},
{
"name": "CVE-2025-40126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40126"
},
{
"name": "CVE-2025-39972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39972"
},
{
"name": "CVE-2025-37748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37748"
},
{
"name": "CVE-2025-38364",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38364"
},
{
"name": "CVE-2025-38615",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38615"
},
{
"name": "CVE-2025-39684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39684"
},
{
"name": "CVE-2025-37836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37836"
},
{
"name": "CVE-2025-38526",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38526"
},
{
"name": "CVE-2025-38472",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38472"
},
{
"name": "CVE-2025-37944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37944"
},
{
"name": "CVE-2025-38506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38506"
},
{
"name": "CVE-2025-40320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40320"
},
{
"name": "CVE-2025-38703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38703"
},
{
"name": "CVE-2025-38494",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38494"
},
{
"name": "CVE-2025-39753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39753"
},
{
"name": "CVE-2025-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38604"
},
{
"name": "CVE-2025-40203",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40203"
},
{
"name": "CVE-2025-38623",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38623"
},
{
"name": "CVE-2025-38193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38193"
},
{
"name": "CVE-2025-38400",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38400"
},
{
"name": "CVE-2025-38136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38136"
},
{
"name": "CVE-2025-40192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40192"
},
{
"name": "CVE-2025-38544",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38544"
},
{
"name": "CVE-2025-37771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37771"
},
{
"name": "CVE-2025-39797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39797"
},
{
"name": "CVE-2025-40200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40200"
},
{
"name": "CVE-2025-38236",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38236"
},
{
"name": "CVE-2025-38725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38725"
},
{
"name": "CVE-2025-37975",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37975"
},
{
"name": "CVE-2025-40124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40124"
},
{
"name": "CVE-2025-38347",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38347"
},
{
"name": "CVE-2025-39776",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39776"
},
{
"name": "CVE-2025-39880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39880"
},
{
"name": "CVE-2025-37998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37998"
},
{
"name": "CVE-2025-38198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38198"
},
{
"name": "CVE-2025-23163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23163"
},
{
"name": "CVE-2025-40094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40094"
},
{
"name": "CVE-2025-37968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37968"
},
{
"name": "CVE-2025-38376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38376"
},
{
"name": "CVE-2025-38006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38006"
},
{
"name": "CVE-2025-40102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40102"
},
{
"name": "CVE-2025-40170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40170"
},
{
"name": "CVE-2025-38437",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38437"
},
{
"name": "CVE-2025-40160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40160"
},
{
"name": "CVE-2025-40284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40284"
},
{
"name": "CVE-2025-38125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38125"
},
{
"name": "CVE-2025-40209",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40209"
},
{
"name": "CVE-2025-40077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40077"
},
{
"name": "CVE-2025-38351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38351"
},
{
"name": "CVE-2025-38048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38048"
},
{
"name": "CVE-2025-40071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40071"
},
{
"name": "CVE-2025-38683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38683"
},
{
"name": "CVE-2025-40113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40113"
},
{
"name": "CVE-2025-39736",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39736"
},
{
"name": "CVE-2025-40234",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40234"
},
{
"name": "CVE-2025-37757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37757"
},
{
"name": "CVE-2025-68247",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68247"
},
{
"name": "CVE-2025-40305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40305"
},
{
"name": "CVE-2025-40080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40080"
},
{
"name": "CVE-2025-40041",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40041"
},
{
"name": "CVE-2025-38009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38009"
},
{
"name": "CVE-2025-40215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40215"
},
{
"name": "CVE-2025-40307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40307"
},
{
"name": "CVE-2025-40111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40111"
},
{
"name": "CVE-2025-38081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38081"
},
{
"name": "CVE-2025-37809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37809"
},
{
"name": "CVE-2024-36350",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36350"
},
{
"name": "CVE-2025-40211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40211"
},
{
"name": "CVE-2025-40068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40068"
},
{
"name": "CVE-2025-38185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38185"
},
{
"name": "CVE-2025-39691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39691"
},
{
"name": "CVE-2025-38406",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38406"
},
{
"name": "CVE-2025-68315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68315"
},
{
"name": "CVE-2025-40163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40163"
},
{
"name": "CVE-2025-40042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40042"
},
{
"name": "CVE-2025-37817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37817"
},
{
"name": "CVE-2025-40155",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40155"
},
{
"name": "CVE-2025-39890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39890"
},
{
"name": "CVE-2025-39742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39742"
},
{
"name": "CVE-2025-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40217"
},
{
"name": "CVE-2025-22102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22102"
},
{
"name": "CVE-2025-37987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37987"
},
{
"name": "CVE-2025-37749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37749"
},
{
"name": "CVE-2024-36331",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36331"
},
{
"name": "CVE-2025-39748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39748"
},
{
"name": "CVE-2025-40133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40133"
},
{
"name": "CVE-2025-38263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38263"
},
{
"name": "CVE-2025-38610",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38610"
},
{
"name": "CVE-2025-37772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37772"
},
{
"name": "CVE-2025-38214",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38214"
},
{
"name": "CVE-2025-38560",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38560"
},
{
"name": "CVE-2025-37994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37994"
},
{
"name": "CVE-2025-38551",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38551"
},
{
"name": "CVE-2025-38701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38701"
},
{
"name": "CVE-2025-38218",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38218"
},
{
"name": "CVE-2025-40329",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40329"
},
{
"name": "CVE-2025-38349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38349"
},
{
"name": "CVE-2025-39726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39726"
},
{
"name": "CVE-2025-38393",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38393"
},
{
"name": "CVE-2025-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37891"
},
{
"name": "CVE-2025-38249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38249"
},
{
"name": "CVE-2025-38716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38716"
},
{
"name": "CVE-2025-39937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39937"
},
{
"name": "CVE-2025-37858",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37858"
},
{
"name": "CVE-2025-38154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38154"
},
{
"name": "CVE-2025-38469",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38469"
},
{
"name": "CVE-2025-38581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38581"
},
{
"name": "CVE-2025-40034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40034"
},
{
"name": "CVE-2025-40060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40060"
},
{
"name": "CVE-2025-39790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39790"
},
{
"name": "CVE-2025-38389",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38389"
},
{
"name": "CVE-2025-38448",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38448"
},
{
"name": "CVE-2025-37780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37780"
},
{
"name": "CVE-2025-37995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37995"
},
{
"name": "CVE-2025-38680",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38680"
},
{
"name": "CVE-2025-37754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37754"
},
{
"name": "CVE-2025-40059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40059"
},
{
"name": "CVE-2025-38497",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38497"
},
{
"name": "CVE-2025-68168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68168"
},
{
"name": "CVE-2025-23156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23156"
},
{
"name": "CVE-2025-23157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23157"
},
{
"name": "CVE-2025-68206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68206"
},
{
"name": "CVE-2025-68309",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68309"
},
{
"name": "CVE-2025-38684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38684"
},
{
"name": "CVE-2025-38165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38165"
},
{
"name": "CVE-2025-40003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40003"
},
{
"name": "CVE-2025-39686",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39686"
},
{
"name": "CVE-2025-39798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39798"
},
{
"name": "CVE-2025-38495",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38495"
},
{
"name": "CVE-2025-37808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37808"
},
{
"name": "CVE-2025-38730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38730"
},
{
"name": "CVE-2025-38052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38052"
},
{
"name": "CVE-2025-38377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38377"
},
{
"name": "CVE-2025-40175",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40175"
},
{
"name": "CVE-2025-68170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68170"
},
{
"name": "CVE-2025-39747",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39747"
},
{
"name": "CVE-2025-68313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68313"
},
{
"name": "CVE-2025-38516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38516"
},
{
"name": "CVE-2025-38462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38462"
},
{
"name": "CVE-2025-38428",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38428"
},
{
"name": "CVE-2025-39714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39714"
},
{
"name": "CVE-2025-38262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38262"
},
{
"name": "CVE-2025-38138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38138"
},
{
"name": "CVE-2025-38035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38035"
},
{
"name": "CVE-2025-37759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37759"
},
{
"name": "CVE-2025-38414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38414"
},
{
"name": "CVE-2025-68197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68197"
},
{
"name": "CVE-2025-40123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40123"
},
{
"name": "CVE-2025-37933",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37933"
},
{
"name": "CVE-2025-38310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38310"
},
{
"name": "CVE-2025-37886",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37886"
},
{
"name": "CVE-2025-37963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37963"
},
{
"name": "CVE-2025-40297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40297"
},
{
"name": "CVE-2025-38226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38226"
},
{
"name": "CVE-2025-39706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39706"
},
{
"name": "CVE-2025-40178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40178"
},
{
"name": "CVE-2025-40363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40363"
},
{
"name": "CVE-2025-38443",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38443"
},
{
"name": "CVE-2025-38576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38576"
},
{
"name": "CVE-2025-39869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39869"
},
{
"name": "CVE-2025-37800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37800"
},
{
"name": "CVE-2025-39985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39985"
},
{
"name": "CVE-2025-40276",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40276"
},
{
"name": "CVE-2025-37900",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37900"
},
{
"name": "CVE-2025-40224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40224"
},
{
"name": "CVE-2025-38439",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38439"
},
{
"name": "CVE-2025-37805",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37805"
},
{
"name": "CVE-2025-68245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68245"
},
{
"name": "CVE-2025-39719",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39719"
},
{
"name": "CVE-2025-40317",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40317"
},
{
"name": "CVE-2025-40236",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40236"
},
{
"name": "CVE-2025-37990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37990"
},
{
"name": "CVE-2025-38553",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38553"
},
{
"name": "CVE-2025-38190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38190"
},
{
"name": "CVE-2025-38180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38180"
},
{
"name": "CVE-2025-39738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39738"
},
{
"name": "CVE-2025-68202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68202"
},
{
"name": "CVE-2025-38145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38145"
},
{
"name": "CVE-2025-40174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40174"
},
{
"name": "CVE-2025-37948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37948"
},
{
"name": "CVE-2025-38166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38166"
},
{
"name": "CVE-2025-40227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40227"
},
{
"name": "CVE-2025-37862",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37862"
},
{
"name": "CVE-2025-38321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38321"
},
{
"name": "CVE-2025-39705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39705"
},
{
"name": "CVE-2025-40316",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40316"
},
{
"name": "CVE-2025-37960",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37960"
},
{
"name": "CVE-2025-38045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38045"
},
{
"name": "CVE-2025-38051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38051"
},
{
"name": "CVE-2025-39713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39713"
},
{
"name": "CVE-2025-37763",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37763"
},
{
"name": "CVE-2025-37954",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37954"
},
{
"name": "CVE-2025-22128",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22128"
},
{
"name": "CVE-2025-40065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40065"
},
{
"name": "CVE-2025-37839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37839"
},
{
"name": "CVE-2025-39744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39744"
},
{
"name": "CVE-2025-38277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38277"
},
{
"name": "CVE-2025-37913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37913"
},
{
"name": "CVE-2025-68177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68177"
},
{
"name": "CVE-2025-39756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39756"
},
{
"name": "CVE-2025-38539",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38539"
},
{
"name": "CVE-2025-40181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40181"
},
{
"name": "CVE-2025-68191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68191"
},
{
"name": "CVE-2025-38044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38044"
},
{
"name": "CVE-2025-68250",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68250"
},
{
"name": "CVE-2025-37786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37786"
},
{
"name": "CVE-2025-40141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40141"
},
{
"name": "CVE-2025-38200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38200"
},
{
"name": "CVE-2025-38480",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38480"
},
{
"name": "CVE-2025-40132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40132"
},
{
"name": "CVE-2025-38346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38346"
},
{
"name": "CVE-2025-40152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40152"
},
{
"name": "CVE-2025-37959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37959"
},
{
"name": "CVE-2025-38191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38191"
},
{
"name": "CVE-2025-39946",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39946"
},
{
"name": "CVE-2025-38062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38062"
},
{
"name": "CVE-2025-38531",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38531"
},
{
"name": "CVE-2025-40288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40288"
},
{
"name": "CVE-2025-68239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68239"
},
{
"name": "CVE-2025-39693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39693"
},
{
"name": "CVE-2025-40281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40281"
},
{
"name": "CVE-2025-68185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68185"
},
{
"name": "CVE-2025-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40304"
},
{
"name": "CVE-2025-38503",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38503"
},
{
"name": "CVE-2025-40110",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40110"
},
{
"name": "CVE-2025-40162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40162"
},
{
"name": "CVE-2025-38630",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38630"
},
{
"name": "CVE-2025-38131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38131"
},
{
"name": "CVE-2025-40268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40268"
},
{
"name": "CVE-2025-39980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39980"
},
{
"name": "CVE-2025-37851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37851"
},
{
"name": "CVE-2025-38481",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38481"
},
{
"name": "CVE-2025-38585",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38585"
},
{
"name": "CVE-2025-38320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38320"
},
{
"name": "CVE-2025-38625",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38625"
},
{
"name": "CVE-2025-38164",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38164"
},
{
"name": "CVE-2025-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40303"
},
{
"name": "CVE-2025-68178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68178"
},
{
"name": "CVE-2025-40337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40337"
},
{
"name": "CVE-2025-40346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40346"
},
{
"name": "CVE-2025-38264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38264"
},
{
"name": "CVE-2025-40036",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40036"
},
{
"name": "CVE-2025-39676",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39676"
},
{
"name": "CVE-2025-40241",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40241"
},
{
"name": "CVE-2025-37980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37980"
},
{
"name": "CVE-2025-38280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38280"
},
{
"name": "CVE-2025-37788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37788"
},
{
"name": "CVE-2025-38427",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38427"
},
{
"name": "CVE-2025-38084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38084"
},
{
"name": "CVE-2025-40046",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40046"
},
{
"name": "CVE-2025-37879",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37879"
},
{
"name": "CVE-2025-38217",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38217"
},
{
"name": "CVE-2025-40030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40030"
},
{
"name": "CVE-2025-40244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40244"
},
{
"name": "CVE-2025-37881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37881"
},
{
"name": "CVE-2025-39995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39995"
},
{
"name": "CVE-2025-38103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38103"
},
{
"name": "CVE-2025-38514",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38514"
},
{
"name": "CVE-2025-39783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39783"
},
{
"name": "CVE-2025-39715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39715"
},
{
"name": "CVE-2025-40323",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40323"
},
{
"name": "CVE-2025-38569",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38569"
},
{
"name": "CVE-2025-38255",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38255"
},
{
"name": "CVE-2025-38512",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38512"
},
{
"name": "CVE-2025-40096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40096"
},
{
"name": "CVE-2025-38622",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38622"
},
{
"name": "CVE-2025-37909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37909"
},
{
"name": "CVE-2025-38700",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38700"
},
{
"name": "CVE-2025-37849",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37849"
},
{
"name": "CVE-2025-38162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38162"
},
{
"name": "CVE-2025-38532",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38532"
},
{
"name": "CVE-2025-39712",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39712"
},
{
"name": "CVE-2025-37812",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37812"
},
{
"name": "CVE-2025-39707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39707"
},
{
"name": "CVE-2025-40275",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40275"
},
{
"name": "CVE-2025-37875",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37875"
},
{
"name": "CVE-2025-38410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38410"
},
{
"name": "CVE-2025-39907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39907"
},
{
"name": "CVE-2025-40182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40182"
},
{
"name": "CVE-2025-68211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68211"
},
{
"name": "CVE-2025-39781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39781"
},
{
"name": "CVE-2025-38640",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38640"
},
{
"name": "CVE-2025-38476",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38476"
},
{
"name": "CVE-2025-38659",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38659"
},
{
"name": "CVE-2025-40339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40339"
},
{
"name": "CVE-2025-40140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40140"
},
{
"name": "CVE-2025-38020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38020"
},
{
"name": "CVE-2025-40223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40223"
},
{
"name": "CVE-2025-38572",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38572"
},
{
"name": "CVE-2025-23140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23140"
},
{
"name": "CVE-2025-23150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23150"
},
{
"name": "CVE-2025-38460",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38460"
},
{
"name": "CVE-2025-40061",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40061"
},
{
"name": "CVE-2025-38182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38182"
},
{
"name": "CVE-2025-38550",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38550"
},
{
"name": "CVE-2024-53114",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53114"
},
{
"name": "CVE-2025-38275",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38275"
},
{
"name": "CVE-2025-40213",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40213"
},
{
"name": "CVE-2025-38345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38345"
},
{
"name": "CVE-2025-40334",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40334"
},
{
"name": "CVE-2025-38170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38170"
},
{
"name": "CVE-2025-39711",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39711"
},
{
"name": "CVE-2025-22115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22115"
},
{
"name": "CVE-2025-22120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22120"
},
{
"name": "CVE-2025-38535",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38535"
},
{
"name": "CVE-2025-38231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38231"
},
{
"name": "CVE-2025-37854",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37854"
},
{
"name": "CVE-2025-40142",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40142"
},
{
"name": "CVE-2025-39873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39873"
},
{
"name": "CVE-2025-40159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40159"
},
{
"name": "CVE-2025-40319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40319"
},
{
"name": "CVE-2025-68193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68193"
},
{
"name": "CVE-2025-38473",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38473"
},
{
"name": "CVE-2025-38113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38113"
},
{
"name": "CVE-2025-38714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38714"
},
{
"name": "CVE-2025-23148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23148"
},
{
"name": "CVE-2025-38361",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38361"
},
{
"name": "CVE-2025-38470",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38470"
},
{
"name": "CVE-2025-38181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38181"
},
{
"name": "CVE-2025-40051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40051"
},
{
"name": "CVE-2025-38391",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38391"
},
{
"name": "CVE-2025-38248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38248"
},
{
"name": "CVE-2025-40351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40351"
},
{
"name": "CVE-2025-40087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40087"
},
{
"name": "CVE-2025-40229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40229"
},
{
"name": "CVE-2025-23147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23147"
},
{
"name": "CVE-2025-39752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39752"
}
],
"initial_release_date": "2026-02-20T00:00:00",
"last_revision_date": "2026-02-20T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0194",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-02-20T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux d\u0027Ubuntu. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et un contournement de la politique de s\u00e9curit\u00e9.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": "2026-02-17",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8048-1",
"url": "https://ubuntu.com/security/notices/USN-8048-1"
},
{
"published_at": "2026-02-17",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8028-5",
"url": "https://ubuntu.com/security/notices/USN-8028-5"
},
{
"published_at": "2026-02-19",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8052-1",
"url": "https://ubuntu.com/security/notices/USN-8052-1"
},
{
"published_at": "2026-02-19",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8028-7",
"url": "https://ubuntu.com/security/notices/USN-8028-7"
},
{
"published_at": "2026-02-17",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8033-5",
"url": "https://ubuntu.com/security/notices/USN-8033-5"
},
{
"published_at": "2026-02-17",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8033-6",
"url": "https://ubuntu.com/security/notices/USN-8033-6"
},
{
"published_at": "2026-02-17",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8028-3",
"url": "https://ubuntu.com/security/notices/USN-8028-3"
},
{
"published_at": "2026-02-20",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7990-5",
"url": "https://ubuntu.com/security/notices/USN-7990-5"
},
{
"published_at": "2026-02-17",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8029-2",
"url": "https://ubuntu.com/security/notices/USN-8029-2"
},
{
"published_at": "2026-02-17",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8034-2",
"url": "https://ubuntu.com/security/notices/USN-8034-2"
},
{
"published_at": "2026-02-17",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8028-4",
"url": "https://ubuntu.com/security/notices/USN-8028-4"
},
{
"published_at": "2026-02-19",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8031-3",
"url": "https://ubuntu.com/security/notices/USN-8031-3"
},
{
"published_at": "2026-02-18",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8031-2",
"url": "https://ubuntu.com/security/notices/USN-8031-2"
},
{
"published_at": "2026-02-19",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8028-6",
"url": "https://ubuntu.com/security/notices/USN-8028-6"
},
{
"published_at": "2026-02-19",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8033-7",
"url": "https://ubuntu.com/security/notices/USN-8033-7"
},
{
"published_at": "2026-02-19",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8033-8",
"url": "https://ubuntu.com/security/notices/USN-8033-8"
}
]
}
CERTFR-2025-AVI-1010
Vulnerability from certfr_avis - Published: 2025-11-14 - Updated: 2025-11-14
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Debian. Elles permettent à un attaquant de provoquer une élévation de privilèges, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Debian bookworm versions ant\u00e9rieures \u00e0 6.1.158-1",
"product": {
"name": "Debian",
"vendor": {
"name": "Debian",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-39987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39987"
},
{
"name": "CVE-2025-21861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21861"
},
{
"name": "CVE-2025-40055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40055"
},
{
"name": "CVE-2025-40029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40029"
},
{
"name": "CVE-2025-40008",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40008"
},
{
"name": "CVE-2025-40048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40048"
},
{
"name": "CVE-2025-40043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40043"
},
{
"name": "CVE-2025-39973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39973"
},
{
"name": "CVE-2025-39943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39943"
},
{
"name": "CVE-2025-39945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39945"
},
{
"name": "CVE-2025-40100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40100"
},
{
"name": "CVE-2025-40019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40019"
},
{
"name": "CVE-2025-40081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40081"
},
{
"name": "CVE-2025-40026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40026"
},
{
"name": "CVE-2025-40103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40103"
},
{
"name": "CVE-2025-40056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40056"
},
{
"name": "CVE-2025-40092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40092"
},
{
"name": "CVE-2025-39967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39967"
},
{
"name": "CVE-2025-40107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40107"
},
{
"name": "CVE-2025-39942",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39942"
},
{
"name": "CVE-2025-39929",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39929"
},
{
"name": "CVE-2025-39949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39949"
},
{
"name": "CVE-2025-40010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40010"
},
{
"name": "CVE-2025-39944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39944"
},
{
"name": "CVE-2025-39953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39953"
},
{
"name": "CVE-2025-39969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39969"
},
{
"name": "CVE-2025-40104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40104"
},
{
"name": "CVE-2025-40001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40001"
},
{
"name": "CVE-2025-40035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40035"
},
{
"name": "CVE-2025-39988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39988"
},
{
"name": "CVE-2025-40020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40020"
},
{
"name": "CVE-2025-40013",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40013"
},
{
"name": "CVE-2025-40049",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40049"
},
{
"name": "CVE-2025-40070",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40070"
},
{
"name": "CVE-2025-40106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40106"
},
{
"name": "CVE-2025-39977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39977"
},
{
"name": "CVE-2025-40027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40027"
},
{
"name": "CVE-2025-39970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39970"
},
{
"name": "CVE-2025-40032",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40032"
},
{
"name": "CVE-2025-39994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39994"
},
{
"name": "CVE-2025-40088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40088"
},
{
"name": "CVE-2025-40062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40062"
},
{
"name": "CVE-2025-40109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40109"
},
{
"name": "CVE-2025-40006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40006"
},
{
"name": "CVE-2025-40011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40011"
},
{
"name": "CVE-2025-40085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40085"
},
{
"name": "CVE-2025-40084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40084"
},
{
"name": "CVE-2025-39998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39998"
},
{
"name": "CVE-2025-39968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39968"
},
{
"name": "CVE-2025-39986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39986"
},
{
"name": "CVE-2025-39955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39955"
},
{
"name": "CVE-2025-40078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40078"
},
{
"name": "CVE-2025-39934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39934"
},
{
"name": "CVE-2025-39978",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39978"
},
{
"name": "CVE-2025-39996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39996"
},
{
"name": "CVE-2025-40053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40053"
},
{
"name": "CVE-2025-39951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39951"
},
{
"name": "CVE-2025-39938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39938"
},
{
"name": "CVE-2025-39982",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39982"
},
{
"name": "CVE-2025-40040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40040"
},
{
"name": "CVE-2025-40095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40095"
},
{
"name": "CVE-2025-40021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40021"
},
{
"name": "CVE-2025-39964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39964"
},
{
"name": "CVE-2025-39993",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39993"
},
{
"name": "CVE-2025-40044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40044"
},
{
"name": "CVE-2025-40105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40105"
},
{
"name": "CVE-2025-39971",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39971"
},
{
"name": "CVE-2025-40093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40093"
},
{
"name": "CVE-2025-40099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40099"
},
{
"name": "CVE-2025-39972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39972"
},
{
"name": "CVE-2025-40018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40018"
},
{
"name": "CVE-2025-40094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40094"
},
{
"name": "CVE-2025-40080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40080"
},
{
"name": "CVE-2025-40068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40068"
},
{
"name": "CVE-2025-40042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40042"
},
{
"name": "CVE-2025-39957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39957"
},
{
"name": "CVE-2025-39931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39931"
},
{
"name": "CVE-2025-39937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39937"
},
{
"name": "CVE-2025-40060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40060"
},
{
"name": "CVE-2025-39985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39985"
},
{
"name": "CVE-2025-39946",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39946"
},
{
"name": "CVE-2025-39980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39980"
},
{
"name": "CVE-2025-40036",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40036"
},
{
"name": "CVE-2025-40030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40030"
},
{
"name": "CVE-2025-39995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39995"
},
{
"name": "CVE-2025-40096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40096"
},
{
"name": "CVE-2025-40022",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40022"
},
{
"name": "CVE-2025-40051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40051"
},
{
"name": "CVE-2025-40087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40087"
}
],
"initial_release_date": "2025-11-14T00:00:00",
"last_revision_date": "2025-11-14T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-1010",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-11-14T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de Debian. Elles permettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Debian",
"vendor_advisories": [
{
"published_at": "2025-11-11",
"title": "Bulletin de s\u00e9curit\u00e9 Debian DSA-6053-1",
"url": "https://lists.debian.org/debian-security-announce/2025/msg00219.html"
}
]
}
MSRC_CVE-2025-40103
Vulnerability from csaf_microsoft - Published: 2025-10-02 00:00 - Updated: 2025-12-07 01:44| URL | Category | |
|---|---|---|
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2025-40103 smb: client: Fix refcount leak for cifs_sb_tlink - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2025/msrc_cve-2025-40103.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "smb: client: Fix refcount leak for cifs_sb_tlink",
"tracking": {
"current_release_date": "2025-12-07T01:44:07.000Z",
"generator": {
"date": "2026-01-03T08:43:43.281Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2025-40103",
"initial_release_date": "2025-10-02T00:00:00.000Z",
"revision_history": [
{
"date": "2025-10-31T01:09:42.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
},
{
"date": "2025-12-07T01:44:07.000Z",
"legacy_version": "2",
"number": "2",
"summary": "Information published."
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "3.0",
"product": {
"name": "Azure Linux 3.0",
"product_id": "17084"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cazl3 kernel 6.6.112.1-2",
"product": {
"name": "\u003cazl3 kernel 6.6.112.1-2",
"product_id": "1"
}
},
{
"category": "product_version",
"name": "azl3 kernel 6.6.112.1-2",
"product": {
"name": "azl3 kernel 6.6.112.1-2",
"product_id": "20613"
}
},
{
"category": "product_version_range",
"name": "azl3 kernel 6.6.104.2-4",
"product": {
"name": "azl3 kernel 6.6.104.2-4",
"product_id": "2"
}
}
],
"category": "product_name",
"name": "kernel"
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 kernel 6.6.112.1-2 as a component of Azure Linux 3.0",
"product_id": "17084-1"
},
"product_reference": "1",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 kernel 6.6.112.1-2 as a component of Azure Linux 3.0",
"product_id": "20613-17084"
},
"product_reference": "20613",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 kernel 6.6.104.2-4 as a component of Azure Linux 3.0",
"product_id": "17084-2"
},
"product_reference": "2",
"relates_to_product_reference": "17084"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-40103",
"notes": [
{
"category": "general",
"text": "Linux",
"title": "Assigning CNA"
}
],
"product_status": {
"fixed": [
"20613-17084"
],
"known_affected": [
"17084-1",
"17084-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-40103 smb: client: Fix refcount leak for cifs_sb_tlink - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2025/msrc_cve-2025-40103.json"
}
],
"remediations": [
{
"category": "none_available",
"date": "2025-10-31T01:09:42.000Z",
"details": "There is no fix available for this vulnerability as of now",
"product_ids": [
"17084-2"
]
},
{
"category": "vendor_fix",
"date": "2025-10-31T01:09:42.000Z",
"details": "6.6.117.1-1:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17084-1"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
}
],
"title": "smb: client: Fix refcount leak for cifs_sb_tlink"
}
]
}
WID-SEC-W-2025-2450
Vulnerability from csaf_certbund - Published: 2025-10-29 23:00 - Updated: 2026-03-05 23:00| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen im Linux Kernel ausnutzen, um nicht n\u00e4her spezifizierte Angriffe durchzuf\u00fchren, die m\u00f6glicherweise zu einer Denial-of-Service-Situation f\u00fchren oder eine Speicherbesch\u00e4digung verursachen k\u00f6nnen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-2450 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-2450.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-2450 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2450"
},
{
"category": "external",
"summary": "Kernel CVE Announce Mailingliste",
"url": "https://lore.kernel.org/linux-cve-announce/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40086",
"url": "https://lore.kernel.org/linux-cve-announce/2025103013-CVE-2025-40086-f0f7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40087",
"url": "https://lore.kernel.org/linux-cve-announce/2025103015-CVE-2025-40087-ff33@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40088",
"url": "https://lore.kernel.org/linux-cve-announce/2025103015-CVE-2025-40088-3491@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40089",
"url": "https://lore.kernel.org/linux-cve-announce/2025103015-CVE-2025-40089-26ca@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40090",
"url": "https://lore.kernel.org/linux-cve-announce/2025103015-CVE-2025-40090-d560@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40091",
"url": "https://lore.kernel.org/linux-cve-announce/2025103015-CVE-2025-40091-8521@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40092",
"url": "https://lore.kernel.org/linux-cve-announce/2025103016-CVE-2025-40092-9135@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40093",
"url": "https://lore.kernel.org/linux-cve-announce/2025103016-CVE-2025-40093-f52d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40094",
"url": "https://lore.kernel.org/linux-cve-announce/2025103016-CVE-2025-40094-113d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40095",
"url": "https://lore.kernel.org/linux-cve-announce/2025103016-CVE-2025-40095-fde5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40096",
"url": "https://lore.kernel.org/linux-cve-announce/2025103016-CVE-2025-40096-09cc@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40097",
"url": "https://lore.kernel.org/linux-cve-announce/2025103016-CVE-2025-40097-7676@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40098",
"url": "https://lore.kernel.org/linux-cve-announce/2025103017-CVE-2025-40098-7f8f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40099",
"url": "https://lore.kernel.org/linux-cve-announce/2025103017-CVE-2025-40099-fdf0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40100",
"url": "https://lore.kernel.org/linux-cve-announce/2025103017-CVE-2025-40100-73e5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40101",
"url": "https://lore.kernel.org/linux-cve-announce/2025103017-CVE-2025-40101-d0c0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40102",
"url": "https://lore.kernel.org/linux-cve-announce/2025103017-CVE-2025-40102-c7d2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40103",
"url": "https://lore.kernel.org/linux-cve-announce/2025103018-CVE-2025-40103-e5ae@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40104",
"url": "https://lore.kernel.org/linux-cve-announce/2025103018-CVE-2025-40104-d5a7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40105",
"url": "https://lore.kernel.org/linux-cve-announce/2025103018-CVE-2025-40105-a635@gregkh/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025:15702-1 vom 2025-11-05",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GN255AQW7RBHZ2H5D5SNPGKZOO7MUKQE/"
},
{
"category": "external",
"summary": "Google Container-Optimized OS release notes vom 2025-11-05",
"url": "https://docs.cloud.google.com/container-optimized-os/docs/release-notes#November_04_2025"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4057-1 vom 2025-11-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-6053 vom 2025-11-12",
"url": "https://lists.debian.org/debian-security-announce/2025/msg00219.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4111-1 vom 2025-11-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4128-1 vom 2025-11-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4132-1 vom 2025-11-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4141-1 vom 2025-11-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4139-1 vom 2025-11-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023306.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4140-1 vom 2025-11-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4189-1 vom 2025-11-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4379 vom 2025-11-25",
"url": "https://lists.debian.org/debian-lts-announce/2025/11/msg00022.html"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025-20091-1 vom 2025-11-27",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QVNKE6YBHUN7AVUHO7UZCJJGK4HYS62H/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:21052-1 vom 2025-11-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023389.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:21064-1 vom 2025-11-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:21040-1 vom 2025-11-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:21056-1 vom 2025-11-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:21080-1 vom 2025-11-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4301-1 vom 2025-11-28",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LLIMXFMWOGTFRJZEC4XPGIMNBCRKQ7IF/"
},
{
"category": "external",
"summary": "Container-Optimized OS release notes vom 2025-12-02",
"url": "https://docs.cloud.google.com/container-optimized-os/docs/release-notes#November_07_2025"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.15-2025-094 vom 2025-12-08",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.15-2025-094.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:21180-1 vom 2025-12-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:21147-1 vom 2025-12-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-28040 vom 2025-12-11",
"url": "http://linux.oracle.com/errata/ELSA-2025-28040.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-28049 vom 2025-12-15",
"url": "https://linux.oracle.com/errata/ELSA-2025-28049.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4404 vom 2025-12-12",
"url": "https://lists.debian.org/debian-lts-announce/2025/12/msg00015.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-28048 vom 2025-12-12",
"url": "https://linux.oracle.com/errata/ELSA-2025-28048.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-28049 vom 2025-12-15",
"url": "https://oss.oracle.com/pipermail/el-errata/2025-December/019260.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4393-1 vom 2025-12-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4422-1 vom 2025-12-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4505-1 vom 2025-12-23",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3D5W2444LYTUJVXYGB63LTMU25GRLRJR/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4517-1 vom 2025-12-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4516-1 vom 2025-12-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4521-1 vom 2025-12-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20021-1 vom 2026-01-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20015-1 vom 2026-01-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20012-1 vom 2026-01-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20059-1 vom 2026-01-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20039-1 vom 2026-01-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0759 vom 2026-01-19",
"url": "https://access.redhat.com/errata/RHSA-2026:0759"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0760 vom 2026-01-19",
"url": "https://access.redhat.com/errata/RHSA-2026:0760"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-0759 vom 2026-01-21",
"url": "https://linux.oracle.com/errata/ELSA-2026-0759.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0278-1 vom 2026-01-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:0759 vom 2026-01-24",
"url": "https://errata.build.resf.org/RLSA-2026:0759"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:0760 vom 2026-01-24",
"url": "https://errata.build.resf.org/RLSA-2026:0760"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0281-1 vom 2026-01-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023914.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0293-1 vom 2026-01-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-50071 vom 2026-01-26",
"url": "https://linux.oracle.com/errata/ELSA-2026-50071.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0315-1 vom 2026-01-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023971.html"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2026-030 vom 2026-01-30",
"url": "https://www.dell.com/support/kbdoc/de-de/000421570/dsa-2026-030-security-update-for-dell-networker-vproxy-multiple-third-party-component-vulnerabilities"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1879 vom 2026-02-04",
"url": "https://access.redhat.com/errata/RHSA-2026:1879"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-50100 vom 2026-02-10",
"url": "http://linux.oracle.com/errata/ELSA-2026-50100.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:2535 vom 2026-02-11",
"url": "https://access.redhat.com/errata/RHSA-2026:2535"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0447-1 vom 2026-02-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:2560 vom 2026-02-11",
"url": "https://access.redhat.com/errata/RHSA-2026:2560"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:2583 vom 2026-02-11",
"url": "https://access.redhat.com/errata/RHSA-2026:2583"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8033-1 vom 2026-02-12",
"url": "https://ubuntu.com/security/notices/USN-8033-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8030-1 vom 2026-02-12",
"url": "https://ubuntu.com/security/notices/USN-8030-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8033-2 vom 2026-02-12",
"url": "https://ubuntu.com/security/notices/USN-8033-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8034-1 vom 2026-02-12",
"url": "https://ubuntu.com/security/notices/USN-8034-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8033-3 vom 2026-02-12",
"url": "https://ubuntu.com/security/notices/USN-8033-3"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0472-1 vom 2026-02-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0471-1 vom 2026-02-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024142.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0473-1 vom 2026-02-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8033-4 vom 2026-02-13",
"url": "https://ubuntu.com/security/notices/USN-8033-4"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20317-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20334-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20333-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8048-1 vom 2026-02-17",
"url": "https://ubuntu.com/security/notices/USN-8048-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8033-5 vom 2026-02-17",
"url": "https://ubuntu.com/security/notices/USN-8033-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8029-2 vom 2026-02-17",
"url": "https://ubuntu.com/security/notices/USN-8029-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8033-6 vom 2026-02-17",
"url": "https://ubuntu.com/security/notices/USN-8033-6"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8029-1 vom 2026-02-17",
"url": "https://ubuntu.com/security/notices/USN-8029-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8034-2 vom 2026-02-17",
"url": "https://ubuntu.com/security/notices/USN-8034-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8033-7 vom 2026-02-19",
"url": "https://ubuntu.com/security/notices/USN-8033-7"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.10-2026-112 vom 2026-02-19",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.10-2026-112.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8033-8 vom 2026-02-19",
"url": "https://ubuntu.com/security/notices/USN-8033-8"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0587-1 vom 2026-02-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8029-3 vom 2026-02-24",
"url": "https://ubuntu.com/security/notices/USN-8029-3"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3275 vom 2026-02-25",
"url": "https://access.redhat.com/errata/RHSA-2026:3275"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-3275 vom 2026-02-26",
"url": "https://linux.oracle.com/errata/ELSA-2026-3275.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20478-1 vom 2026-02-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20477-1 vom 2026-02-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20479-1 vom 2026-02-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20473-1 vom 2026-02-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024411.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20520-1 vom 2026-02-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20496-1 vom 2026-02-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20519-1 vom 2026-02-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20498-1 vom 2026-02-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2026:20287-1 vom 2026-02-28",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K7KIWX7XP3UMVFSHT47OOZ24TQQYNNHI/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20562-1 vom 2026-03-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20599-1 vom 2026-03-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20555-1 vom 2026-03-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024590.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20615-1 vom 2026-03-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20570-1 vom 2026-03-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20561-1 vom 2026-03-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html"
}
],
"source_lang": "en-US",
"title": "Linux Kernel: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2026-03-05T23:00:00.000+00:00",
"generator": {
"date": "2026-03-06T10:24:13.798+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2025-2450",
"initial_release_date": "2025-10-29T23:00:00.000+00:00",
"revision_history": [
{
"date": "2025-10-29T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-10-30T23:00:00.000+00:00",
"number": "2",
"summary": "Referenz(en) aufgenommen: EUVD-2025-36975, EUVD-2025-36973, EUVD-2025-36974, EUVD-2025-36977, EUVD-2025-36976"
},
{
"date": "2025-11-05T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von openSUSE aufgenommen"
},
{
"date": "2025-11-11T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von SUSE und Debian aufgenommen"
},
{
"date": "2025-11-16T23:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-11-18T23:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-11-19T23:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-11-24T23:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-11-25T23:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-11-26T23:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von openSUSE aufgenommen"
},
{
"date": "2025-11-27T23:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-11-30T23:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-12-01T23:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates aufgenommen"
},
{
"date": "2025-12-08T23:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-12-10T23:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von SUSE und Oracle Linux aufgenommen"
},
{
"date": "2025-12-14T23:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von Oracle Linux und Debian aufgenommen"
},
{
"date": "2025-12-15T23:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-12-17T23:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-12-22T23:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-12-23T23:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-12-28T23:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-01-11T23:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-01-14T23:00:00.000+00:00",
"number": "23",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-01-18T23:00:00.000+00:00",
"number": "24",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-01-21T23:00:00.000+00:00",
"number": "25",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2026-01-25T23:00:00.000+00:00",
"number": "26",
"summary": "Neue Updates von SUSE und Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2026-01-26T23:00:00.000+00:00",
"number": "27",
"summary": "Neue Updates von SUSE und Oracle Linux aufgenommen"
},
{
"date": "2026-01-28T23:00:00.000+00:00",
"number": "28",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-01-29T23:00:00.000+00:00",
"number": "29",
"summary": "Neue Updates von Dell aufgenommen"
},
{
"date": "2026-02-04T23:00:00.000+00:00",
"number": "30",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-02-09T23:00:00.000+00:00",
"number": "31",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2026-02-10T23:00:00.000+00:00",
"number": "32",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-02-11T23:00:00.000+00:00",
"number": "33",
"summary": "Neue Updates von SUSE und Red Hat aufgenommen"
},
{
"date": "2026-02-12T23:00:00.000+00:00",
"number": "34",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-15T23:00:00.000+00:00",
"number": "35",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-17T23:00:00.000+00:00",
"number": "36",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-02-18T23:00:00.000+00:00",
"number": "37",
"summary": "Neue Updates von Ubuntu und Amazon aufgenommen"
},
{
"date": "2026-02-19T23:00:00.000+00:00",
"number": "38",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-02-22T23:00:00.000+00:00",
"number": "39",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-23T23:00:00.000+00:00",
"number": "40",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-02-24T23:00:00.000+00:00",
"number": "41",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-02-25T23:00:00.000+00:00",
"number": "42",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2026-02-26T23:00:00.000+00:00",
"number": "43",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-03-01T23:00:00.000+00:00",
"number": "44",
"summary": "Neue Updates von SUSE und openSUSE aufgenommen"
},
{
"date": "2026-03-05T23:00:00.000+00:00",
"number": "45",
"summary": "Neue Updates von SUSE aufgenommen"
}
],
"status": "final",
"version": "45"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vProxy \u003c19.14",
"product": {
"name": "Dell NetWorker vProxy \u003c19.14",
"product_id": "T050451"
}
},
{
"category": "product_version",
"name": "vProxy 19.14",
"product": {
"name": "Dell NetWorker vProxy 19.14",
"product_id": "T050451-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:networker:vproxy__19.14"
}
}
}
],
"category": "product_name",
"name": "NetWorker"
}
],
"category": "vendor",
"name": "Dell"
},
{
"branches": [
{
"category": "product_name",
"name": "Google Container-Optimized OS",
"product": {
"name": "Google Container-Optimized OS",
"product_id": "1607324",
"product_identification_helper": {
"cpe": "cpe:/o:google:container-optimized_os:-"
}
}
}
],
"category": "vendor",
"name": "Google"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source Linux Kernel",
"product": {
"name": "Open Source Linux Kernel",
"product_id": "T048225",
"product_identification_helper": {
"cpe": "cpe:/o:linux:linux_kernel:-"
}
}
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "RESF Rocky Linux",
"product": {
"name": "RESF Rocky Linux",
"product_id": "T032255",
"product_identification_helper": {
"cpe": "cpe:/o:resf:rocky_linux:-"
}
}
}
],
"category": "vendor",
"name": "RESF"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
},
{
"category": "product_name",
"name": "SUSE openSUSE",
"product": {
"name": "SUSE openSUSE",
"product_id": "T027843",
"product_identification_helper": {
"cpe": "cpe:/o:suse:opensuse:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-40086",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"1607324",
"T050451",
"T032255",
"T048225"
]
},
"release_date": "2025-10-29T23:00:00.000+00:00",
"title": "CVE-2025-40086"
},
{
"cve": "CVE-2025-40087",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"1607324",
"T050451",
"T032255",
"T048225"
]
},
"release_date": "2025-10-29T23:00:00.000+00:00",
"title": "CVE-2025-40087"
},
{
"cve": "CVE-2025-40088",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"1607324",
"T050451",
"T032255",
"T048225"
]
},
"release_date": "2025-10-29T23:00:00.000+00:00",
"title": "CVE-2025-40088"
},
{
"cve": "CVE-2025-40089",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"1607324",
"T050451",
"T032255",
"T048225"
]
},
"release_date": "2025-10-29T23:00:00.000+00:00",
"title": "CVE-2025-40089"
},
{
"cve": "CVE-2025-40090",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"1607324",
"T050451",
"T032255",
"T048225"
]
},
"release_date": "2025-10-29T23:00:00.000+00:00",
"title": "CVE-2025-40090"
},
{
"cve": "CVE-2025-40091",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"1607324",
"T050451",
"T032255",
"T048225"
]
},
"release_date": "2025-10-29T23:00:00.000+00:00",
"title": "CVE-2025-40091"
},
{
"cve": "CVE-2025-40092",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"1607324",
"T050451",
"T032255",
"T048225"
]
},
"release_date": "2025-10-29T23:00:00.000+00:00",
"title": "CVE-2025-40092"
},
{
"cve": "CVE-2025-40093",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"1607324",
"T050451",
"T032255",
"T048225"
]
},
"release_date": "2025-10-29T23:00:00.000+00:00",
"title": "CVE-2025-40093"
},
{
"cve": "CVE-2025-40094",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"1607324",
"T050451",
"T032255",
"T048225"
]
},
"release_date": "2025-10-29T23:00:00.000+00:00",
"title": "CVE-2025-40094"
},
{
"cve": "CVE-2025-40095",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"1607324",
"T050451",
"T032255",
"T048225"
]
},
"release_date": "2025-10-29T23:00:00.000+00:00",
"title": "CVE-2025-40095"
},
{
"cve": "CVE-2025-40096",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"1607324",
"T050451",
"T032255",
"T048225"
]
},
"release_date": "2025-10-29T23:00:00.000+00:00",
"title": "CVE-2025-40096"
},
{
"cve": "CVE-2025-40097",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"1607324",
"T050451",
"T032255",
"T048225"
]
},
"release_date": "2025-10-29T23:00:00.000+00:00",
"title": "CVE-2025-40097"
},
{
"cve": "CVE-2025-40098",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"1607324",
"T050451",
"T032255",
"T048225"
]
},
"release_date": "2025-10-29T23:00:00.000+00:00",
"title": "CVE-2025-40098"
},
{
"cve": "CVE-2025-40099",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"1607324",
"T050451",
"T032255",
"T048225"
]
},
"release_date": "2025-10-29T23:00:00.000+00:00",
"title": "CVE-2025-40099"
},
{
"cve": "CVE-2025-40100",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"1607324",
"T050451",
"T032255",
"T048225"
]
},
"release_date": "2025-10-29T23:00:00.000+00:00",
"title": "CVE-2025-40100"
},
{
"cve": "CVE-2025-40101",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"1607324",
"T050451",
"T032255",
"T048225"
]
},
"release_date": "2025-10-29T23:00:00.000+00:00",
"title": "CVE-2025-40101"
},
{
"cve": "CVE-2025-40102",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"1607324",
"T050451",
"T032255",
"T048225"
]
},
"release_date": "2025-10-29T23:00:00.000+00:00",
"title": "CVE-2025-40102"
},
{
"cve": "CVE-2025-40103",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"1607324",
"T050451",
"T032255",
"T048225"
]
},
"release_date": "2025-10-29T23:00:00.000+00:00",
"title": "CVE-2025-40103"
},
{
"cve": "CVE-2025-40104",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"1607324",
"T050451",
"T032255",
"T048225"
]
},
"release_date": "2025-10-29T23:00:00.000+00:00",
"title": "CVE-2025-40104"
},
{
"cve": "CVE-2025-40105",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"1607324",
"T050451",
"T032255",
"T048225"
]
},
"release_date": "2025-10-29T23:00:00.000+00:00",
"title": "CVE-2025-40105"
}
]
}
GHSA-RG54-MXFQ-R39J
Vulnerability from github – Published: 2025-10-30 12:31 – Updated: 2025-10-30 12:31In the Linux kernel, the following vulnerability has been resolved:
smb: client: Fix refcount leak for cifs_sb_tlink
Fix three refcount inconsistency issues related to cifs_sb_tlink.
Comments for cifs_sb_tlink state that cifs_put_tlink() needs to be
called after successful calls to cifs_sb_tlink(). Three calls fail to
update refcount accordingly, leading to possible resource leaks.
{
"affected": [],
"aliases": [
"CVE-2025-40103"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-10-30T10:15:34Z",
"severity": null
},
"details": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: Fix refcount leak for cifs_sb_tlink\n\nFix three refcount inconsistency issues related to `cifs_sb_tlink`.\n\nComments for `cifs_sb_tlink` state that `cifs_put_tlink()` needs to be\ncalled after successful calls to `cifs_sb_tlink()`. Three calls fail to\nupdate refcount accordingly, leading to possible resource leaks.",
"id": "GHSA-rg54-mxfq-r39j",
"modified": "2025-10-30T12:31:11Z",
"published": "2025-10-30T12:31:10Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-40103"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/790282abe9d805f08618c1c24ea2529e7259b692"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/896bb31e1416f582503db1350cf1bd10dc64e5a6"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/c2b77f42205ef485a647f62082c442c1cd69d3fc"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/d7dd034c14928306db1b46be277ae439b84dacf9"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/e15605b68b490186da2ad8029c0351a9cfb0b9af"
}
],
"schema_version": "1.4.0",
"severity": []
}
OPENSUSE-SU-2025:15702-1
Vulnerability from csaf_opensuse - Published: 2025-11-04 00:00 - Updated: 2025-11-04 00:00| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "kernel-devel-6.17.7-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the kernel-devel-6.17.7-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-15702",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15702-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40018 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40018/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40019 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40019/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40025 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40025/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40026 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40026/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40027 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40027/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40028 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40028/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40029 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40029/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40030 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40030/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40031 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40031/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40032 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40032/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40033 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40033/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40034 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40034/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40035 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40035/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40036 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40036/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40037 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40037/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40038 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40038/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40039 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40039/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40040 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40040/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40041 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40041/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40042 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40042/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40043 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40043/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40044 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40044/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40045 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40045/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40046 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40046/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40047 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40047/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40048 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40048/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40049 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40049/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40050 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40050/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40051 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40051/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40052 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40052/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40053 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40053/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40054 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40054/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40055 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40055/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40056 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40056/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40057 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40057/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40058 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40058/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40059 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40059/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40060 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40060/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40061 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40061/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40062 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40062/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40063 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40063/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40064 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40064/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40065 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40065/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40066 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40066/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40067 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40067/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40068 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40068/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40069 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40069/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40070 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40070/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40071 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40071/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40072 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40072/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40073 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40073/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40074 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40074/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40075 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40075/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40076 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40076/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40077 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40077/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40078 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40078/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40079 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40079/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40080 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40080/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40081 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40081/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40082 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40082/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40084 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40084/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40085 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40085/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40086 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40086/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40087 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40087/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40088 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40088/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40089 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40089/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40090 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40090/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40091 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40091/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40092 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40092/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40093 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40093/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40094 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40094/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40095 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40095/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40096 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40096/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40097 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40097/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40098 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40098/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40099 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40099/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40100 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40100/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40101 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40101/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40102 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40102/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40103 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40103/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40104 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40104/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40105 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40105/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40106 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40106/"
}
],
"title": "kernel-devel-6.17.7-1.1 on GA media",
"tracking": {
"current_release_date": "2025-11-04T00:00:00Z",
"generator": {
"date": "2025-11-04T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:15702-1",
"initial_release_date": "2025-11-04T00:00:00Z",
"revision_history": [
{
"date": "2025-11-04T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-6.17.7-1.1.aarch64",
"product": {
"name": "kernel-devel-6.17.7-1.1.aarch64",
"product_id": "kernel-devel-6.17.7-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-macros-6.17.7-1.1.aarch64",
"product": {
"name": "kernel-macros-6.17.7-1.1.aarch64",
"product_id": "kernel-macros-6.17.7-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-source-6.17.7-1.1.aarch64",
"product": {
"name": "kernel-source-6.17.7-1.1.aarch64",
"product_id": "kernel-source-6.17.7-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-6.17.7-1.1.aarch64",
"product": {
"name": "kernel-source-vanilla-6.17.7-1.1.aarch64",
"product_id": "kernel-source-vanilla-6.17.7-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-6.17.7-1.1.ppc64le",
"product": {
"name": "kernel-devel-6.17.7-1.1.ppc64le",
"product_id": "kernel-devel-6.17.7-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-macros-6.17.7-1.1.ppc64le",
"product": {
"name": "kernel-macros-6.17.7-1.1.ppc64le",
"product_id": "kernel-macros-6.17.7-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-source-6.17.7-1.1.ppc64le",
"product": {
"name": "kernel-source-6.17.7-1.1.ppc64le",
"product_id": "kernel-source-6.17.7-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-6.17.7-1.1.ppc64le",
"product": {
"name": "kernel-source-vanilla-6.17.7-1.1.ppc64le",
"product_id": "kernel-source-vanilla-6.17.7-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-6.17.7-1.1.s390x",
"product": {
"name": "kernel-devel-6.17.7-1.1.s390x",
"product_id": "kernel-devel-6.17.7-1.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-macros-6.17.7-1.1.s390x",
"product": {
"name": "kernel-macros-6.17.7-1.1.s390x",
"product_id": "kernel-macros-6.17.7-1.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-source-6.17.7-1.1.s390x",
"product": {
"name": "kernel-source-6.17.7-1.1.s390x",
"product_id": "kernel-source-6.17.7-1.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-6.17.7-1.1.s390x",
"product": {
"name": "kernel-source-vanilla-6.17.7-1.1.s390x",
"product_id": "kernel-source-vanilla-6.17.7-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-6.17.7-1.1.x86_64",
"product": {
"name": "kernel-devel-6.17.7-1.1.x86_64",
"product_id": "kernel-devel-6.17.7-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-macros-6.17.7-1.1.x86_64",
"product": {
"name": "kernel-macros-6.17.7-1.1.x86_64",
"product_id": "kernel-macros-6.17.7-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-source-6.17.7-1.1.x86_64",
"product": {
"name": "kernel-source-6.17.7-1.1.x86_64",
"product_id": "kernel-source-6.17.7-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-6.17.7-1.1.x86_64",
"product": {
"name": "kernel-source-vanilla-6.17.7-1.1.x86_64",
"product_id": "kernel-source-vanilla-6.17.7-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-6.17.7-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64"
},
"product_reference": "kernel-devel-6.17.7-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-6.17.7-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le"
},
"product_reference": "kernel-devel-6.17.7-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-6.17.7-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x"
},
"product_reference": "kernel-devel-6.17.7-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-6.17.7-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64"
},
"product_reference": "kernel-devel-6.17.7-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-6.17.7-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64"
},
"product_reference": "kernel-macros-6.17.7-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-6.17.7-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le"
},
"product_reference": "kernel-macros-6.17.7-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-6.17.7-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x"
},
"product_reference": "kernel-macros-6.17.7-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-6.17.7-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64"
},
"product_reference": "kernel-macros-6.17.7-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-6.17.7-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64"
},
"product_reference": "kernel-source-6.17.7-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-6.17.7-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le"
},
"product_reference": "kernel-source-6.17.7-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-6.17.7-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x"
},
"product_reference": "kernel-source-6.17.7-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-6.17.7-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64"
},
"product_reference": "kernel-source-6.17.7-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-vanilla-6.17.7-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64"
},
"product_reference": "kernel-source-vanilla-6.17.7-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-vanilla-6.17.7-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le"
},
"product_reference": "kernel-source-vanilla-6.17.7-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-vanilla-6.17.7-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x"
},
"product_reference": "kernel-source-vanilla-6.17.7-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-vanilla-6.17.7-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
},
"product_reference": "kernel-source-vanilla-6.17.7-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-40018",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40018"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipvs: Defer ip_vs_ftp unregister during netns cleanup\n\nOn the netns cleanup path, __ip_vs_ftp_exit() may unregister ip_vs_ftp\nbefore connections with valid cp-\u003eapp pointers are flushed, leading to a\nuse-after-free.\n\nFix this by introducing a global `exiting_module` flag, set to true in\nip_vs_ftp_exit() before unregistering the pernet subsystem. In\n__ip_vs_ftp_exit(), skip ip_vs_ftp unregister if called during netns\ncleanup (when exiting_module is false) and defer it to\n__ip_vs_cleanup_batch(), which unregisters all apps after all connections\nare flushed. If called during module exit, unregister ip_vs_ftp\nimmediately.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40018",
"url": "https://www.suse.com/security/cve/CVE-2025-40018"
},
{
"category": "external",
"summary": "SUSE Bug 1247374 for CVE-2025-40018",
"url": "https://bugzilla.suse.com/1247374"
},
{
"category": "external",
"summary": "SUSE Bug 1252688 for CVE-2025-40018",
"url": "https://bugzilla.suse.com/1252688"
},
{
"category": "external",
"summary": "SUSE Bug 1252689 for CVE-2025-40018",
"url": "https://bugzilla.suse.com/1252689"
},
{
"category": "external",
"summary": "SUSE Bug 1253291 for CVE-2025-40018",
"url": "https://bugzilla.suse.com/1253291"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-04T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-40018"
},
{
"cve": "CVE-2025-40019",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40019"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: essiv - Check ssize for decryption and in-place encryption\n\nMove the ssize check to the start in essiv_aead_crypt so that\nit\u0027s also checked for decryption and in-place encryption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40019",
"url": "https://www.suse.com/security/cve/CVE-2025-40019"
},
{
"category": "external",
"summary": "SUSE Bug 1252678 for CVE-2025-40019",
"url": "https://bugzilla.suse.com/1252678"
},
{
"category": "external",
"summary": "SUSE Bug 1252719 for CVE-2025-40019",
"url": "https://bugzilla.suse.com/1252719"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-04T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-40019"
},
{
"cve": "CVE-2025-40025",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40025"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nf2fs: fix to do sanity check on node footer for non inode dnode\n\nAs syzbot reported below:\n\n------------[ cut here ]------------\nkernel BUG at fs/f2fs/file.c:1243!\nOops: invalid opcode: 0000 [#1] SMP KASAN NOPTI\nCPU: 0 UID: 0 PID: 5354 Comm: syz.0.0 Not tainted 6.17.0-rc1-syzkaller-00211-g90d970cade8e #0 PREEMPT(full)\nRIP: 0010:f2fs_truncate_hole+0x69e/0x6c0 fs/f2fs/file.c:1243\nCall Trace:\n \u003cTASK\u003e\n f2fs_punch_hole+0x2db/0x330 fs/f2fs/file.c:1306\n f2fs_fallocate+0x546/0x990 fs/f2fs/file.c:2018\n vfs_fallocate+0x666/0x7e0 fs/open.c:342\n ksys_fallocate fs/open.c:366 [inline]\n __do_sys_fallocate fs/open.c:371 [inline]\n __se_sys_fallocate fs/open.c:369 [inline]\n __x64_sys_fallocate+0xc0/0x110 fs/open.c:369\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7f1e65f8ebe9\n\nw/ a fuzzed image, f2fs may encounter panic due to it detects inconsistent\ntruncation range in direct node in f2fs_truncate_hole().\n\nThe root cause is: a non-inode dnode may has the same footer.ino and\nfooter.nid, so the dnode will be parsed as an inode, then ADDRS_PER_PAGE()\nmay return wrong blkaddr count which may be 923 typically, by chance,\ndn.ofs_in_node is equal to 923, then count can be calculated to 0 in below\nstatement, later it will trigger panic w/ f2fs_bug_on(, count == 0 || ...).\n\n\tcount = min(end_offset - dn.ofs_in_node, pg_end - pg_start);\n\nThis patch introduces a new node_type NODE_TYPE_NON_INODE, then allowing\npassing the new_type to sanity_check_node_footer in f2fs_get_node_folio()\nto detect corruption that a non-inode dnode has the same footer.ino and\nfooter.nid.\n\nScripts to reproduce:\nmkfs.f2fs -f /dev/vdb\nmount /dev/vdb /mnt/f2fs\ntouch /mnt/f2fs/foo\ntouch /mnt/f2fs/bar\ndd if=/dev/zero of=/mnt/f2fs/foo bs=1M count=8\numount /mnt/f2fs\ninject.f2fs --node --mb i_nid --nid 4 --idx 0 --val 5 /dev/vdb\nmount /dev/vdb /mnt/f2fs\nxfs_io /mnt/f2fs/foo -c \"fpunch 6984k 4k\"",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40025",
"url": "https://www.suse.com/security/cve/CVE-2025-40025"
},
{
"category": "external",
"summary": "SUSE Bug 1252766 for CVE-2025-40025",
"url": "https://bugzilla.suse.com/1252766"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40025"
},
{
"cve": "CVE-2025-40026",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40026"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: x86: Don\u0027t (re)check L1 intercepts when completing userspace I/O\n\nWhen completing emulation of instruction that generated a userspace exit\nfor I/O, don\u0027t recheck L1 intercepts as KVM has already finished that\nphase of instruction execution, i.e. has already committed to allowing L2\nto perform I/O. If L1 (or host userspace) modifies the I/O permission\nbitmaps during the exit to userspace, KVM will treat the access as being\nintercepted despite already having emulated the I/O access.\n\nPivot on EMULTYPE_NO_DECODE to detect that KVM is completing emulation.\nOf the three users of EMULTYPE_NO_DECODE, only complete_emulated_io() (the\nintended \"recipient\") can reach the code in question. gp_interception()\u0027s\nuse is mutually exclusive with is_guest_mode(), and\ncomplete_emulated_insn_gp() unconditionally pairs EMULTYPE_NO_DECODE with\nEMULTYPE_SKIP.\n\nThe bad behavior was detected by a syzkaller program that toggles port I/O\ninterception during the userspace I/O exit, ultimately resulting in a WARN\non vcpu-\u003earch.pio.count being non-zero due to KVM no completing emulation\nof the I/O instruction.\n\n WARNING: CPU: 23 PID: 1083 at arch/x86/kvm/x86.c:8039 emulator_pio_in_out+0x154/0x170 [kvm]\n Modules linked in: kvm_intel kvm irqbypass\n CPU: 23 UID: 1000 PID: 1083 Comm: repro Not tainted 6.16.0-rc5-c1610d2d66b1-next-vm #74 NONE\n Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015\n RIP: 0010:emulator_pio_in_out+0x154/0x170 [kvm]\n PKRU: 55555554\n Call Trace:\n \u003cTASK\u003e\n kvm_fast_pio+0xd6/0x1d0 [kvm]\n vmx_handle_exit+0x149/0x610 [kvm_intel]\n kvm_arch_vcpu_ioctl_run+0xda8/0x1ac0 [kvm]\n kvm_vcpu_ioctl+0x244/0x8c0 [kvm]\n __x64_sys_ioctl+0x8a/0xd0\n do_syscall_64+0x5d/0xc60\n entry_SYSCALL_64_after_hwframe+0x4b/0x53\n \u003c/TASK\u003e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40026",
"url": "https://www.suse.com/security/cve/CVE-2025-40026"
},
{
"category": "external",
"summary": "SUSE Bug 1252764 for CVE-2025-40026",
"url": "https://bugzilla.suse.com/1252764"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.6,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-04T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2025-40026"
},
{
"cve": "CVE-2025-40027",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40027"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/9p: fix double req put in p9_fd_cancelled\n\nSyzkaller reports a KASAN issue as below:\n\ngeneral protection fault, probably for non-canonical address 0xfbd59c0000000021: 0000 [#1] PREEMPT SMP KASAN NOPTI\nKASAN: maybe wild-memory-access in range [0xdead000000000108-0xdead00000000010f]\nCPU: 0 PID: 5083 Comm: syz-executor.2 Not tainted 6.1.134-syzkaller-00037-g855bd1d7d838 #0\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014\nRIP: 0010:__list_del include/linux/list.h:114 [inline]\nRIP: 0010:__list_del_entry include/linux/list.h:137 [inline]\nRIP: 0010:list_del include/linux/list.h:148 [inline]\nRIP: 0010:p9_fd_cancelled+0xe9/0x200 net/9p/trans_fd.c:734\n\nCall Trace:\n \u003cTASK\u003e\n p9_client_flush+0x351/0x440 net/9p/client.c:614\n p9_client_rpc+0xb6b/0xc70 net/9p/client.c:734\n p9_client_version net/9p/client.c:920 [inline]\n p9_client_create+0xb51/0x1240 net/9p/client.c:1027\n v9fs_session_init+0x1f0/0x18f0 fs/9p/v9fs.c:408\n v9fs_mount+0xba/0xcb0 fs/9p/vfs_super.c:126\n legacy_get_tree+0x108/0x220 fs/fs_context.c:632\n vfs_get_tree+0x8e/0x300 fs/super.c:1573\n do_new_mount fs/namespace.c:3056 [inline]\n path_mount+0x6a6/0x1e90 fs/namespace.c:3386\n do_mount fs/namespace.c:3399 [inline]\n __do_sys_mount fs/namespace.c:3607 [inline]\n __se_sys_mount fs/namespace.c:3584 [inline]\n __x64_sys_mount+0x283/0x300 fs/namespace.c:3584\n do_syscall_x64 arch/x86/entry/common.c:51 [inline]\n do_syscall_64+0x35/0x80 arch/x86/entry/common.c:81\n entry_SYSCALL_64_after_hwframe+0x6e/0xd8\n\nThis happens because of a race condition between:\n\n- The 9p client sending an invalid flush request and later cleaning it up;\n- The 9p client in p9_read_work() canceled all pending requests.\n\n Thread 1 Thread 2\n ...\n p9_client_create()\n ...\n p9_fd_create()\n ...\n p9_conn_create()\n ...\n // start Thread 2\n INIT_WORK(\u0026m-\u003erq, p9_read_work);\n p9_read_work()\n ...\n p9_client_rpc()\n ...\n ...\n p9_conn_cancel()\n ...\n spin_lock(\u0026m-\u003ereq_lock);\n ...\n p9_fd_cancelled()\n ...\n ...\n spin_unlock(\u0026m-\u003ereq_lock);\n // status rewrite\n p9_client_cb(m-\u003eclient, req, REQ_STATUS_ERROR)\n // first remove\n list_del(\u0026req-\u003ereq_list);\n ...\n\n spin_lock(\u0026m-\u003ereq_lock)\n ...\n // second remove\n list_del(\u0026req-\u003ereq_list);\n spin_unlock(\u0026m-\u003ereq_lock)\n ...\n\nCommit 74d6a5d56629 (\"9p/trans_fd: Fix concurrency del of req_list in\np9_fd_cancelled/p9_read_work\") fixes a concurrency issue in the 9p filesystem\nclient where the req_list could be deleted simultaneously by both\np9_read_work and p9_fd_cancelled functions, but for the case where req-\u003estatus\nequals REQ_STATUS_RCVD.\n\nUpdate the check for req-\u003estatus in p9_fd_cancelled to skip processing not\njust received requests, but anything that is not SENT, as whatever\nchanged the state from SENT also removed the request from its list.\n\nFound by Linux Verification Center (linuxtesting.org) with Syzkaller.\n\n[updated the check from status == RECV || status == ERROR to status != SENT]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40027",
"url": "https://www.suse.com/security/cve/CVE-2025-40027"
},
{
"category": "external",
"summary": "SUSE Bug 1252763 for CVE-2025-40027",
"url": "https://bugzilla.suse.com/1252763"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40027"
},
{
"cve": "CVE-2025-40028",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40028"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbinder: fix double-free in dbitmap\n\nA process might fail to allocate a new bitmap when trying to expand its\nproc-\u003edmap. In that case, dbitmap_grow() fails and frees the old bitmap\nvia dbitmap_free(). However, the driver calls dbitmap_free() again when\nthe same process terminates, leading to a double-free error:\n\n ==================================================================\n BUG: KASAN: double-free in binder_proc_dec_tmpref+0x2e0/0x55c\n Free of addr ffff00000b7c1420 by task kworker/9:1/209\n\n CPU: 9 UID: 0 PID: 209 Comm: kworker/9:1 Not tainted 6.17.0-rc6-dirty #5 PREEMPT\n Hardware name: linux,dummy-virt (DT)\n Workqueue: events binder_deferred_func\n Call trace:\n kfree+0x164/0x31c\n binder_proc_dec_tmpref+0x2e0/0x55c\n binder_deferred_func+0xc24/0x1120\n process_one_work+0x520/0xba4\n [...]\n\n Allocated by task 448:\n __kmalloc_noprof+0x178/0x3c0\n bitmap_zalloc+0x24/0x30\n binder_open+0x14c/0xc10\n [...]\n\n Freed by task 449:\n kfree+0x184/0x31c\n binder_inc_ref_for_node+0xb44/0xe44\n binder_transaction+0x29b4/0x7fbc\n binder_thread_write+0x1708/0x442c\n binder_ioctl+0x1b50/0x2900\n [...]\n ==================================================================\n\nFix this issue by marking proc-\u003emap NULL in dbitmap_free().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40028",
"url": "https://www.suse.com/security/cve/CVE-2025-40028"
},
{
"category": "external",
"summary": "SUSE Bug 1252762 for CVE-2025-40028",
"url": "https://bugzilla.suse.com/1252762"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40028"
},
{
"cve": "CVE-2025-40029",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40029"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbus: fsl-mc: Check return value of platform_get_resource()\n\nplatform_get_resource() returns NULL in case of failure, so check its\nreturn value and propagate the error in order to prevent NULL pointer\ndereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40029",
"url": "https://www.suse.com/security/cve/CVE-2025-40029"
},
{
"category": "external",
"summary": "SUSE Bug 1252772 for CVE-2025-40029",
"url": "https://bugzilla.suse.com/1252772"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40029"
},
{
"cve": "CVE-2025-40030",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40030"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npinctrl: check the return value of pinmux_ops::get_function_name()\n\nWhile the API contract in docs doesn\u0027t specify it explicitly, the\ngeneric implementation of the get_function_name() callback from struct\npinmux_ops - pinmux_generic_get_function_name() - can fail and return\nNULL. This is already checked in pinmux_check_ops() so add a similar\ncheck in pinmux_func_name_to_selector() instead of passing the returned\npointer right down to strcmp() where the NULL can get dereferenced. This\nis normal operation when adding new pinfunctions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40030",
"url": "https://www.suse.com/security/cve/CVE-2025-40030"
},
{
"category": "external",
"summary": "SUSE Bug 1252773 for CVE-2025-40030",
"url": "https://bugzilla.suse.com/1252773"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40030"
},
{
"cve": "CVE-2025-40031",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40031"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntee: fix register_shm_helper()\n\nIn register_shm_helper(), fix incorrect error handling for a call to\niov_iter_extract_pages(). A case is missing for when\niov_iter_extract_pages() only got some pages and return a number larger\nthan 0, but not the requested amount.\n\nThis fixes a possible NULL pointer dereference following a bad input from\nioctl(TEE_IOC_SHM_REGISTER) where parts of the buffer isn\u0027t mapped.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40031",
"url": "https://www.suse.com/security/cve/CVE-2025-40031"
},
{
"category": "external",
"summary": "SUSE Bug 1252779 for CVE-2025-40031",
"url": "https://bugzilla.suse.com/1252779"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40031"
},
{
"cve": "CVE-2025-40032",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40032"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nPCI: endpoint: pci-epf-test: Add NULL check for DMA channels before release\n\nThe fields dma_chan_tx and dma_chan_rx of the struct pci_epf_test can be\nNULL even after EPF initialization. Then it is prudent to check that\nthey have non-NULL values before releasing the channels. Add the checks\nin pci_epf_test_clean_dma_chan().\n\nWithout the checks, NULL pointer dereferences happen and they can lead\nto a kernel panic in some cases:\n\n Unable to handle kernel NULL pointer dereference at virtual address 0000000000000050\n Call trace:\n dma_release_channel+0x2c/0x120 (P)\n pci_epf_test_epc_deinit+0x94/0xc0 [pci_epf_test]\n pci_epc_deinit_notify+0x74/0xc0\n tegra_pcie_ep_pex_rst_irq+0x250/0x5d8\n irq_thread_fn+0x34/0xb8\n irq_thread+0x18c/0x2e8\n kthread+0x14c/0x210\n ret_from_fork+0x10/0x20\n\n[mani: trimmed the stack trace]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40032",
"url": "https://www.suse.com/security/cve/CVE-2025-40032"
},
{
"category": "external",
"summary": "SUSE Bug 1252841 for CVE-2025-40032",
"url": "https://bugzilla.suse.com/1252841"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40032"
},
{
"cve": "CVE-2025-40033",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40033"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nremoteproc: pru: Fix potential NULL pointer dereference in pru_rproc_set_ctable()\n\npru_rproc_set_ctable() accessed rproc-\u003epriv before the IS_ERR_OR_NULL\ncheck, which could lead to a null pointer dereference. Move the pru\nassignment, ensuring we never dereference a NULL rproc pointer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40033",
"url": "https://www.suse.com/security/cve/CVE-2025-40033"
},
{
"category": "external",
"summary": "SUSE Bug 1252824 for CVE-2025-40033",
"url": "https://bugzilla.suse.com/1252824"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40033"
},
{
"cve": "CVE-2025-40034",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40034"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nPCI/AER: Avoid NULL pointer dereference in aer_ratelimit()\n\nWhen platform firmware supplies error information to the OS, e.g., via the\nACPI APEI GHES mechanism, it may identify an error source device that\ndoesn\u0027t advertise an AER Capability and therefore dev-\u003eaer_info, which\ncontains AER stats and ratelimiting data, is NULL.\n\npci_dev_aer_stats_incr() already checks dev-\u003eaer_info for NULL, but\naer_ratelimit() did not, leading to NULL pointer dereferences like this one\nfrom the URL below:\n\n {1}[Hardware Error]: Hardware error from APEI Generic Hardware Error Source: 0\n {1}[Hardware Error]: event severity: corrected\n {1}[Hardware Error]: device_id: 0000:00:00.0\n {1}[Hardware Error]: vendor_id: 0x8086, device_id: 0x2020\n {1}[Hardware Error]: aer_cor_status: 0x00001000, aer_cor_mask: 0x00002000\n BUG: kernel NULL pointer dereference, address: 0000000000000264\n RIP: 0010:___ratelimit+0xc/0x1b0\n pci_print_aer+0x141/0x360\n aer_recover_work_func+0xb5/0x130\n\n[8086:2020] is an Intel \"Sky Lake-E DMI3 Registers\" device that claims to\nbe a Root Port but does not advertise an AER Capability.\n\nAdd a NULL check in aer_ratelimit() to avoid the NULL pointer dereference.\nNote that this also prevents ratelimiting these events from GHES.\n\n[bhelgaas: add crash details to commit log]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40034",
"url": "https://www.suse.com/security/cve/CVE-2025-40034"
},
{
"category": "external",
"summary": "SUSE Bug 1252868 for CVE-2025-40034",
"url": "https://bugzilla.suse.com/1252868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40034"
},
{
"cve": "CVE-2025-40035",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40035"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nInput: uinput - zero-initialize uinput_ff_upload_compat to avoid info leak\n\nStruct ff_effect_compat is embedded twice inside\nuinput_ff_upload_compat, contains internal padding. In particular, there\nis a hole after struct ff_replay to satisfy alignment requirements for\nthe following union member. Without clearing the structure,\ncopy_to_user() may leak stack data to userspace.\n\nInitialize ff_up_compat to zero before filling valid fields.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40035",
"url": "https://www.suse.com/security/cve/CVE-2025-40035"
},
{
"category": "external",
"summary": "SUSE Bug 1252866 for CVE-2025-40035",
"url": "https://bugzilla.suse.com/1252866"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40035"
},
{
"cve": "CVE-2025-40036",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40036"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmisc: fastrpc: fix possible map leak in fastrpc_put_args\n\ncopy_to_user() failure would cause an early return without cleaning up\nthe fdlist, which has been updated by the DSP. This could lead to map\nleak. Fix this by redirecting to a cleanup path on failure, ensuring\nthat all mapped buffers are properly released before returning.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40036",
"url": "https://www.suse.com/security/cve/CVE-2025-40036"
},
{
"category": "external",
"summary": "SUSE Bug 1252865 for CVE-2025-40036",
"url": "https://bugzilla.suse.com/1252865"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40036"
},
{
"cve": "CVE-2025-40037",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40037"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfbdev: simplefb: Fix use after free in simplefb_detach_genpds()\n\nThe pm_domain cleanup can not be devres managed as it uses struct\nsimplefb_par which is allocated within struct fb_info by\nframebuffer_alloc(). This allocation is explicitly freed by\nunregister_framebuffer() in simplefb_remove().\nDevres managed cleanup runs after the device remove call and thus can no\nlonger access struct simplefb_par.\nCall simplefb_detach_genpds() explicitly from simplefb_destroy() like\nthe cleanup functions for clocks and regulators.\n\nFixes an use after free on M2 Mac mini during\naperture_remove_conflicting_devices() using the downstream asahi kernel\nwith Debian\u0027s kernel config. For unknown reasons this started to\nconsistently dereference an invalid pointer in v6.16.3 based kernels.\n\n[ 6.736134] BUG: KASAN: slab-use-after-free in simplefb_detach_genpds+0x58/0x220\n[ 6.743545] Read of size 4 at addr ffff8000304743f0 by task (udev-worker)/227\n[ 6.750697]\n[ 6.752182] CPU: 6 UID: 0 PID: 227 Comm: (udev-worker) Tainted: G S 6.16.3-asahi+ #16 PREEMPTLAZY\n[ 6.752186] Tainted: [S]=CPU_OUT_OF_SPEC\n[ 6.752187] Hardware name: Apple Mac mini (M2, 2023) (DT)\n[ 6.752189] Call trace:\n[ 6.752190] show_stack+0x34/0x98 (C)\n[ 6.752194] dump_stack_lvl+0x60/0x80\n[ 6.752197] print_report+0x17c/0x4d8\n[ 6.752201] kasan_report+0xb4/0x100\n[ 6.752206] __asan_report_load4_noabort+0x20/0x30\n[ 6.752209] simplefb_detach_genpds+0x58/0x220\n[ 6.752213] devm_action_release+0x50/0x98\n[ 6.752216] release_nodes+0xd0/0x2c8\n[ 6.752219] devres_release_all+0xfc/0x178\n[ 6.752221] device_unbind_cleanup+0x28/0x168\n[ 6.752224] device_release_driver_internal+0x34c/0x470\n[ 6.752228] device_release_driver+0x20/0x38\n[ 6.752231] bus_remove_device+0x1b0/0x380\n[ 6.752234] device_del+0x314/0x820\n[ 6.752238] platform_device_del+0x3c/0x1e8\n[ 6.752242] platform_device_unregister+0x20/0x50\n[ 6.752246] aperture_detach_platform_device+0x1c/0x30\n[ 6.752250] aperture_detach_devices+0x16c/0x290\n[ 6.752253] aperture_remove_conflicting_devices+0x34/0x50\n...\n[ 6.752343]\n[ 6.967409] Allocated by task 62:\n[ 6.970724] kasan_save_stack+0x3c/0x70\n[ 6.974560] kasan_save_track+0x20/0x40\n[ 6.978397] kasan_save_alloc_info+0x40/0x58\n[ 6.982670] __kasan_kmalloc+0xd4/0xd8\n[ 6.986420] __kmalloc_noprof+0x194/0x540\n[ 6.990432] framebuffer_alloc+0xc8/0x130\n[ 6.994444] simplefb_probe+0x258/0x2378\n...\n[ 7.054356]\n[ 7.055838] Freed by task 227:\n[ 7.058891] kasan_save_stack+0x3c/0x70\n[ 7.062727] kasan_save_track+0x20/0x40\n[ 7.066565] kasan_save_free_info+0x4c/0x80\n[ 7.070751] __kasan_slab_free+0x6c/0xa0\n[ 7.074675] kfree+0x10c/0x380\n[ 7.077727] framebuffer_release+0x5c/0x90\n[ 7.081826] simplefb_destroy+0x1b4/0x2c0\n[ 7.085837] put_fb_info+0x98/0x100\n[ 7.089326] unregister_framebuffer+0x178/0x320\n[ 7.093861] simplefb_remove+0x3c/0x60\n[ 7.097611] platform_remove+0x60/0x98\n[ 7.101361] device_remove+0xb8/0x160\n[ 7.105024] device_release_driver_internal+0x2fc/0x470\n[ 7.110256] device_release_driver+0x20/0x38\n[ 7.114529] bus_remove_device+0x1b0/0x380\n[ 7.118628] device_del+0x314/0x820\n[ 7.122116] platform_device_del+0x3c/0x1e8\n[ 7.126302] platform_device_unregister+0x20/0x50\n[ 7.131012] aperture_detach_platform_device+0x1c/0x30\n[ 7.136157] aperture_detach_devices+0x16c/0x290\n[ 7.140779] aperture_remove_conflicting_devices+0x34/0x50\n...",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40037",
"url": "https://www.suse.com/security/cve/CVE-2025-40037"
},
{
"category": "external",
"summary": "SUSE Bug 1252819 for CVE-2025-40037",
"url": "https://bugzilla.suse.com/1252819"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40037"
},
{
"cve": "CVE-2025-40038",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40038"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: SVM: Skip fastpath emulation on VM-Exit if next RIP isn\u0027t valid\n\nSkip the WRMSR and HLT fastpaths in SVM\u0027s VM-Exit handler if the next RIP\nisn\u0027t valid, e.g. because KVM is running with nrips=false. SVM must\ndecode and emulate to skip the instruction if the CPU doesn\u0027t provide the\nnext RIP, and getting the instruction bytes to decode requires reading\nguest memory. Reading guest memory through the emulator can fault, i.e.\ncan sleep, which is disallowed since the fastpath handlers run with IRQs\ndisabled.\n\n BUG: sleeping function called from invalid context at ./include/linux/uaccess.h:106\n in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 32611, name: qemu\n preempt_count: 1, expected: 0\n INFO: lockdep is turned off.\n irq event stamp: 30580\n hardirqs last enabled at (30579): [\u003cffffffffc08b2527\u003e] vcpu_run+0x1787/0x1db0 [kvm]\n hardirqs last disabled at (30580): [\u003cffffffffb4f62e32\u003e] __schedule+0x1e2/0xed0\n softirqs last enabled at (30570): [\u003cffffffffb4247a64\u003e] fpu_swap_kvm_fpstate+0x44/0x210\n softirqs last disabled at (30568): [\u003cffffffffb4247a64\u003e] fpu_swap_kvm_fpstate+0x44/0x210\n CPU: 298 UID: 0 PID: 32611 Comm: qemu Tainted: G U 6.16.0-smp--e6c618b51cfe-sleep #782 NONE\n Tainted: [U]=USER\n Hardware name: Google Astoria-Turin/astoria, BIOS 0.20241223.2-0 01/17/2025\n Call Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x7d/0xb0\n __might_resched+0x271/0x290\n __might_fault+0x28/0x80\n kvm_vcpu_read_guest_page+0x8d/0xc0 [kvm]\n kvm_fetch_guest_virt+0x92/0xc0 [kvm]\n __do_insn_fetch_bytes+0xf3/0x1e0 [kvm]\n x86_decode_insn+0xd1/0x1010 [kvm]\n x86_emulate_instruction+0x105/0x810 [kvm]\n __svm_skip_emulated_instruction+0xc4/0x140 [kvm_amd]\n handle_fastpath_invd+0xc4/0x1a0 [kvm]\n vcpu_run+0x11a1/0x1db0 [kvm]\n kvm_arch_vcpu_ioctl_run+0x5cc/0x730 [kvm]\n kvm_vcpu_ioctl+0x578/0x6a0 [kvm]\n __se_sys_ioctl+0x6d/0xb0\n do_syscall_64+0x8a/0x2c0\n entry_SYSCALL_64_after_hwframe+0x4b/0x53\n RIP: 0033:0x7f479d57a94b\n \u003c/TASK\u003e\n\nNote, this is essentially a reapply of commit 5c30e8101e8d (\"KVM: SVM:\nSkip WRMSR fastpath on VM-Exit if next RIP isn\u0027t valid\"), but with\ndifferent justification (KVM now grabs SRCU when skipping the instruction\nfor other reasons).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40038",
"url": "https://www.suse.com/security/cve/CVE-2025-40038"
},
{
"category": "external",
"summary": "SUSE Bug 1252817 for CVE-2025-40038",
"url": "https://bugzilla.suse.com/1252817"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40038"
},
{
"cve": "CVE-2025-40039",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40039"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nksmbd: Fix race condition in RPC handle list access\n\nThe \u0027sess-\u003erpc_handle_list\u0027 XArray manages RPC handles within a ksmbd\nsession. Access to this list is intended to be protected by\n\u0027sess-\u003erpc_lock\u0027 (an rw_semaphore). However, the locking implementation was\nflawed, leading to potential race conditions.\n\nIn ksmbd_session_rpc_open(), the code incorrectly acquired only a read lock\nbefore calling xa_store() and xa_erase(). Since these operations modify\nthe XArray structure, a write lock is required to ensure exclusive access\nand prevent data corruption from concurrent modifications.\n\nFurthermore, ksmbd_session_rpc_method() accessed the list using xa_load()\nwithout holding any lock at all. This could lead to reading inconsistent\ndata or a potential use-after-free if an entry is concurrently removed and\nthe pointer is dereferenced.\n\nFix these issues by:\n1. Using down_write() and up_write() in ksmbd_session_rpc_open()\n to ensure exclusive access during XArray modification, and ensuring\n the lock is correctly released on error paths.\n2. Adding down_read() and up_read() in ksmbd_session_rpc_method()\n to safely protect the lookup.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40039",
"url": "https://www.suse.com/security/cve/CVE-2025-40039"
},
{
"category": "external",
"summary": "SUSE Bug 1252783 for CVE-2025-40039",
"url": "https://bugzilla.suse.com/1252783"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40039"
},
{
"cve": "CVE-2025-40040",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40040"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/ksm: fix flag-dropping behavior in ksm_madvise\n\nsyzkaller discovered the following crash: (kernel BUG)\n\n[ 44.607039] ------------[ cut here ]------------\n[ 44.607422] kernel BUG at mm/userfaultfd.c:2067!\n[ 44.608148] Oops: invalid opcode: 0000 [#1] SMP DEBUG_PAGEALLOC KASAN NOPTI\n[ 44.608814] CPU: 1 UID: 0 PID: 2475 Comm: reproducer Not tainted 6.16.0-rc6 #1 PREEMPT(none)\n[ 44.609635] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014\n[ 44.610695] RIP: 0010:userfaultfd_release_all+0x3a8/0x460\n\n\u003csnip other registers, drop unreliable trace\u003e\n\n[ 44.617726] Call Trace:\n[ 44.617926] \u003cTASK\u003e\n[ 44.619284] userfaultfd_release+0xef/0x1b0\n[ 44.620976] __fput+0x3f9/0xb60\n[ 44.621240] fput_close_sync+0x110/0x210\n[ 44.622222] __x64_sys_close+0x8f/0x120\n[ 44.622530] do_syscall_64+0x5b/0x2f0\n[ 44.622840] entry_SYSCALL_64_after_hwframe+0x76/0x7e\n[ 44.623244] RIP: 0033:0x7f365bb3f227\n\nKernel panics because it detects UFFD inconsistency during\nuserfaultfd_release_all(). Specifically, a VMA which has a valid pointer\nto vma-\u003evm_userfaultfd_ctx, but no UFFD flags in vma-\u003evm_flags.\n\nThe inconsistency is caused in ksm_madvise(): when user calls madvise()\nwith MADV_UNMEARGEABLE on a VMA that is registered for UFFD in MINOR mode,\nit accidentally clears all flags stored in the upper 32 bits of\nvma-\u003evm_flags.\n\nAssuming x86_64 kernel build, unsigned long is 64-bit and unsigned int and\nint are 32-bit wide. This setup causes the following mishap during the \u0026=\n~VM_MERGEABLE assignment.\n\nVM_MERGEABLE is a 32-bit constant of type unsigned int, 0x8000\u00270000. \nAfter ~ is applied, it becomes 0x7fff\u0027ffff unsigned int, which is then\npromoted to unsigned long before the \u0026 operation. This promotion fills\nupper 32 bits with leading 0s, as we\u0027re doing unsigned conversion (and\neven for a signed conversion, this wouldn\u0027t help as the leading bit is 0).\n\u0026 operation thus ends up AND-ing vm_flags with 0x0000\u00270000\u00277fff\u0027ffff\ninstead of intended 0xffff\u0027ffff\u00277fff\u0027ffff and hence accidentally clears\nthe upper 32-bits of its value.\n\nFix it by changing `VM_MERGEABLE` constant to unsigned long, using the\nBIT() macro.\n\nNote: other VM_* flags are not affected: This only happens to the\nVM_MERGEABLE flag, as the other VM_* flags are all constants of type int\nand after ~ operation, they end up with leading 1 and are thus converted\nto unsigned long with leading 1s.\n\nNote 2:\nAfter commit 31defc3b01d9 (\"userfaultfd: remove (VM_)BUG_ON()s\"), this is\nno longer a kernel BUG, but a WARNING at the same place:\n\n[ 45.595973] WARNING: CPU: 1 PID: 2474 at mm/userfaultfd.c:2067\n\nbut the root-cause (flag-drop) remains the same.\n\n[akpm@linux-foundation.org: rust bindgen wasn\u0027t able to handle BIT(), from Miguel]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40040",
"url": "https://www.suse.com/security/cve/CVE-2025-40040"
},
{
"category": "external",
"summary": "SUSE Bug 1252780 for CVE-2025-40040",
"url": "https://bugzilla.suse.com/1252780"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40040"
},
{
"cve": "CVE-2025-40041",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40041"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nLoongArch: BPF: Sign-extend struct ops return values properly\n\nThe ns_bpf_qdisc selftest triggers a kernel panic:\n\n Oops[#1]:\n CPU 0 Unable to handle kernel paging request at virtual address 0000000000741d58, era == 90000000851b5ac0, ra == 90000000851b5aa4\n CPU: 0 UID: 0 PID: 449 Comm: test_progs Tainted: G OE 6.16.0+ #3 PREEMPT(full)\n Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE\n Hardware name: QEMU QEMU Virtual Machine, BIOS unknown 2/2/2022\n pc 90000000851b5ac0 ra 90000000851b5aa4 tp 90000001076b8000 sp 90000001076bb600\n a0 0000000000741ce8 a1 0000000000000001 a2 90000001076bb5c0 a3 0000000000000008\n a4 90000001004c4620 a5 9000000100741ce8 a6 0000000000000000 a7 0100000000000000\n t0 0000000000000010 t1 0000000000000000 t2 9000000104d24d30 t3 0000000000000001\n t4 4f2317da8a7e08c4 t5 fffffefffc002f00 t6 90000001004c4620 t7 ffffffffc61c5b3d\n t8 0000000000000000 u0 0000000000000001 s9 0000000000000050 s0 90000001075bc800\n s1 0000000000000040 s2 900000010597c400 s3 0000000000000008 s4 90000001075bc880\n s5 90000001075bc8f0 s6 0000000000000000 s7 0000000000741ce8 s8 0000000000000000\n ra: 90000000851b5aa4 __qdisc_run+0xac/0x8d8\n ERA: 90000000851b5ac0 __qdisc_run+0xc8/0x8d8\n CRMD: 000000b0 (PLV0 -IE -DA +PG DACF=CC DACM=CC -WE)\n PRMD: 00000004 (PPLV0 +PIE -PWE)\n EUEN: 00000007 (+FPE +SXE +ASXE -BTE)\n ECFG: 00071c1d (LIE=0,2-4,10-12 VS=7)\n ESTAT: 00010000 [PIL] (IS= ECode=1 EsubCode=0)\n BADV: 0000000000741d58\n PRID: 0014c010 (Loongson-64bit, Loongson-3A5000)\n Modules linked in: bpf_testmod(OE) [last unloaded: bpf_testmod(OE)]\n Process test_progs (pid: 449, threadinfo=000000009af02b3a, task=00000000e9ba4956)\n Stack : 0000000000000000 90000001075bc8ac 90000000869524a8 9000000100741ce8\n 90000001075bc800 9000000100415300 90000001075bc8ac 0000000000000000\n 900000010597c400 900000008694a000 0000000000000000 9000000105b59000\n 90000001075bc800 9000000100741ce8 0000000000000050 900000008513000c\n 9000000086936000 0000000100094d4c fffffff400676208 0000000000000000\n 9000000105b59000 900000008694a000 9000000086bf0dc0 9000000105b59000\n 9000000086bf0d68 9000000085147010 90000001075be788 0000000000000000\n 9000000086bf0f98 0000000000000001 0000000000000010 9000000006015840\n 0000000000000000 9000000086be6c40 0000000000000000 0000000000000000\n 0000000000000000 4f2317da8a7e08c4 0000000000000101 4f2317da8a7e08c4\n ...\n Call Trace:\n [\u003c90000000851b5ac0\u003e] __qdisc_run+0xc8/0x8d8\n [\u003c9000000085130008\u003e] __dev_queue_xmit+0x578/0x10f0\n [\u003c90000000853701c0\u003e] ip6_finish_output2+0x2f0/0x950\n [\u003c9000000085374bc8\u003e] ip6_finish_output+0x2b8/0x448\n [\u003c9000000085370b24\u003e] ip6_xmit+0x304/0x858\n [\u003c90000000853c4438\u003e] inet6_csk_xmit+0x100/0x170\n [\u003c90000000852b32f0\u003e] __tcp_transmit_skb+0x490/0xdd0\n [\u003c90000000852b47fc\u003e] tcp_connect+0xbcc/0x1168\n [\u003c90000000853b9088\u003e] tcp_v6_connect+0x580/0x8a0\n [\u003c90000000852e7738\u003e] __inet_stream_connect+0x170/0x480\n [\u003c90000000852e7a98\u003e] inet_stream_connect+0x50/0x88\n [\u003c90000000850f2814\u003e] __sys_connect+0xe4/0x110\n [\u003c90000000850f2858\u003e] sys_connect+0x18/0x28\n [\u003c9000000085520c94\u003e] do_syscall+0x94/0x1a0\n [\u003c9000000083df1fb8\u003e] handle_syscall+0xb8/0x158\n\n Code: 4001ad80 2400873f 2400832d \u003c240073cc\u003e 001137ff 001133ff 6407b41f 001503cc 0280041d\n\n ---[ end trace 0000000000000000 ]---\n\nThe bpf_fifo_dequeue prog returns a skb which is a pointer. The pointer\nis treated as a 32bit value and sign extend to 64bit in epilogue. This\nbehavior is right for most bpf prog types but wrong for struct ops which\nrequires LoongArch ABI.\n\nSo let\u0027s sign extend struct ops return values according to the LoongArch\nABI ([1]) and return value spec in function model.\n\n[1]: https://loongson.github.io/LoongArch-Documentation/LoongArch-ELF-ABI-EN.html",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40041",
"url": "https://www.suse.com/security/cve/CVE-2025-40041"
},
{
"category": "external",
"summary": "SUSE Bug 1252860 for CVE-2025-40041",
"url": "https://bugzilla.suse.com/1252860"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40041"
},
{
"cve": "CVE-2025-40042",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40042"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntracing: Fix race condition in kprobe initialization causing NULL pointer dereference\n\nThere is a critical race condition in kprobe initialization that can lead to\nNULL pointer dereference and kernel crash.\n\n[1135630.084782] Unable to handle kernel paging request at virtual address 0000710a04630000\n...\n[1135630.260314] pstate: 404003c9 (nZcv DAIF +PAN -UAO)\n[1135630.269239] pc : kprobe_perf_func+0x30/0x260\n[1135630.277643] lr : kprobe_dispatcher+0x44/0x60\n[1135630.286041] sp : ffffaeff4977fa40\n[1135630.293441] x29: ffffaeff4977fa40 x28: ffffaf015340e400\n[1135630.302837] x27: 0000000000000000 x26: 0000000000000000\n[1135630.312257] x25: ffffaf029ed108a8 x24: ffffaf015340e528\n[1135630.321705] x23: ffffaeff4977fc50 x22: ffffaeff4977fc50\n[1135630.331154] x21: 0000000000000000 x20: ffffaeff4977fc50\n[1135630.340586] x19: ffffaf015340e400 x18: 0000000000000000\n[1135630.349985] x17: 0000000000000000 x16: 0000000000000000\n[1135630.359285] x15: 0000000000000000 x14: 0000000000000000\n[1135630.368445] x13: 0000000000000000 x12: 0000000000000000\n[1135630.377473] x11: 0000000000000000 x10: 0000000000000000\n[1135630.386411] x9 : 0000000000000000 x8 : 0000000000000000\n[1135630.395252] x7 : 0000000000000000 x6 : 0000000000000000\n[1135630.403963] x5 : 0000000000000000 x4 : 0000000000000000\n[1135630.412545] x3 : 0000710a04630000 x2 : 0000000000000006\n[1135630.421021] x1 : ffffaeff4977fc50 x0 : 0000710a04630000\n[1135630.429410] Call trace:\n[1135630.434828] kprobe_perf_func+0x30/0x260\n[1135630.441661] kprobe_dispatcher+0x44/0x60\n[1135630.448396] aggr_pre_handler+0x70/0xc8\n[1135630.454959] kprobe_breakpoint_handler+0x140/0x1e0\n[1135630.462435] brk_handler+0xbc/0xd8\n[1135630.468437] do_debug_exception+0x84/0x138\n[1135630.475074] el1_dbg+0x18/0x8c\n[1135630.480582] security_file_permission+0x0/0xd0\n[1135630.487426] vfs_write+0x70/0x1c0\n[1135630.493059] ksys_write+0x5c/0xc8\n[1135630.498638] __arm64_sys_write+0x24/0x30\n[1135630.504821] el0_svc_common+0x78/0x130\n[1135630.510838] el0_svc_handler+0x38/0x78\n[1135630.516834] el0_svc+0x8/0x1b0\n\nkernel/trace/trace_kprobe.c: 1308\n0xffff3df8995039ec \u003ckprobe_perf_func+0x2c\u003e: ldr x21, [x24,#120]\ninclude/linux/compiler.h: 294\n0xffff3df8995039f0 \u003ckprobe_perf_func+0x30\u003e: ldr x1, [x21,x0]\n\nkernel/trace/trace_kprobe.c\n1308: head = this_cpu_ptr(call-\u003eperf_events);\n1309: if (hlist_empty(head))\n1310: \treturn 0;\n\ncrash\u003e struct trace_event_call -o\nstruct trace_event_call {\n ...\n [120] struct hlist_head *perf_events; //(call-\u003eperf_event)\n ...\n}\n\ncrash\u003e struct trace_event_call ffffaf015340e528\nstruct trace_event_call {\n ...\n perf_events = 0xffff0ad5fa89f088, //this value is correct, but x21 = 0\n ...\n}\n\nRace Condition Analysis:\n\nThe race occurs between kprobe activation and perf_events initialization:\n\n CPU0 CPU1\n ==== ====\n perf_kprobe_init\n perf_trace_event_init\n tp_event-\u003eperf_events = list;(1)\n tp_event-\u003eclass-\u003ereg (2)\u003c- KPROBE ACTIVE\n Debug exception triggers\n ...\n kprobe_dispatcher\n kprobe_perf_func (tk-\u003etp.flags \u0026 TP_FLAG_PROFILE)\n head = this_cpu_ptr(call-\u003eperf_events)(3)\n (perf_events is still NULL)\n\nProblem:\n1. CPU0 executes (1) assigning tp_event-\u003eperf_events = list\n2. CPU0 executes (2) enabling kprobe functionality via class-\u003ereg()\n3. CPU1 triggers and reaches kprobe_dispatcher\n4. CPU1 checks TP_FLAG_PROFILE - condition passes (step 2 completed)\n5. CPU1 calls kprobe_perf_func() and crashes at (3) because\n call-\u003eperf_events is still NULL\n\nCPU1 sees that kprobe functionality is enabled but does not see that\nperf_events has been assigned.\n\nAdd pairing read an\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40042",
"url": "https://www.suse.com/security/cve/CVE-2025-40042"
},
{
"category": "external",
"summary": "SUSE Bug 1252861 for CVE-2025-40042",
"url": "https://bugzilla.suse.com/1252861"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40042"
},
{
"cve": "CVE-2025-40043",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40043"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: nfc: nci: Add parameter validation for packet data\n\nSyzbot reported an uninitialized value bug in nci_init_req, which was\nintroduced by commit 5aca7966d2a7 (\"Merge tag\n\u0027perf-tools-fixes-for-v6.17-2025-09-16\u0027 of\ngit://git.kernel.org/pub/scm/linux/kernel/git/perf/perf-tools\").\n\nThis bug arises due to very limited and poor input validation\nthat was done at nic_valid_size(). This validation only\nvalidates the skb-\u003elen (directly reflects size provided at the\nuserspace interface) with the length provided in the buffer\nitself (interpreted as NCI_HEADER). This leads to the processing\nof memory content at the address assuming the correct layout\nper what opcode requires there. This leads to the accesses to\nbuffer of `skb_buff-\u003edata` which is not assigned anything yet.\n\nFollowing the same silent drop of packets of invalid sizes at\n`nic_valid_size()`, add validation of the data in the respective\nhandlers and return error values in case of failure. Release\nthe skb if error values are returned from handlers in\n`nci_nft_packet` and effectively do a silent drop\n\nPossible TODO: because we silently drop the packets, the\ncall to `nci_request` will be waiting for completion of request\nand will face timeouts. These timeouts can get excessively logged\nin the dmesg. A proper handling of them may require to export\n`nci_request_cancel` (or propagate error handling from the\nnft packets handlers).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40043",
"url": "https://www.suse.com/security/cve/CVE-2025-40043"
},
{
"category": "external",
"summary": "SUSE Bug 1252787 for CVE-2025-40043",
"url": "https://bugzilla.suse.com/1252787"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40043"
},
{
"cve": "CVE-2025-40044",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40044"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs: udf: fix OOB read in lengthAllocDescs handling\n\nWhen parsing Allocation Extent Descriptor, lengthAllocDescs comes from\non-disk data and must be validated against the block size. Crafted or\ncorrupted images may set lengthAllocDescs so that the total descriptor\nlength (sizeof(allocExtDesc) + lengthAllocDescs) exceeds the buffer,\nleading udf_update_tag() to call crc_itu_t() on out-of-bounds memory and\ntrigger a KASAN use-after-free read.\n\nBUG: KASAN: use-after-free in crc_itu_t+0x1d5/0x2b0 lib/crc-itu-t.c:60\nRead of size 1 at addr ffff888041e7d000 by task syz-executor317/5309\n\nCPU: 0 UID: 0 PID: 5309 Comm: syz-executor317 Not tainted 6.12.0-rc4-syzkaller-00261-g850925a8133c #0\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014\nCall Trace:\n \u003cTASK\u003e\n __dump_stack lib/dump_stack.c:94 [inline]\n dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:377 [inline]\n print_report+0x169/0x550 mm/kasan/report.c:488\n kasan_report+0x143/0x180 mm/kasan/report.c:601\n crc_itu_t+0x1d5/0x2b0 lib/crc-itu-t.c:60\n udf_update_tag+0x70/0x6a0 fs/udf/misc.c:261\n udf_write_aext+0x4d8/0x7b0 fs/udf/inode.c:2179\n extent_trunc+0x2f7/0x4a0 fs/udf/truncate.c:46\n udf_truncate_tail_extent+0x527/0x7e0 fs/udf/truncate.c:106\n udf_release_file+0xc1/0x120 fs/udf/file.c:185\n __fput+0x23f/0x880 fs/file_table.c:431\n task_work_run+0x24f/0x310 kernel/task_work.c:239\n exit_task_work include/linux/task_work.h:43 [inline]\n do_exit+0xa2f/0x28e0 kernel/exit.c:939\n do_group_exit+0x207/0x2c0 kernel/exit.c:1088\n __do_sys_exit_group kernel/exit.c:1099 [inline]\n __se_sys_exit_group kernel/exit.c:1097 [inline]\n __x64_sys_exit_group+0x3f/0x40 kernel/exit.c:1097\n x64_sys_call+0x2634/0x2640 arch/x86/include/generated/asm/syscalls_64.h:232\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n \u003c/TASK\u003e\n\nValidate the computed total length against epos-\u003ebh-\u003eb_size.\n\nFound by Linux Verification Center (linuxtesting.org) with Syzkaller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40044",
"url": "https://www.suse.com/security/cve/CVE-2025-40044"
},
{
"category": "external",
"summary": "SUSE Bug 1252785 for CVE-2025-40044",
"url": "https://bugzilla.suse.com/1252785"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40044"
},
{
"cve": "CVE-2025-40045",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40045"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: codecs: wcd937x: set the comp soundwire port correctly\n\nFor some reason we endup with setting soundwire port for\nHPHL_COMP and HPHR_COMP as zero, this can potentially result\nin a memory corruption due to accessing and setting -1 th element of\nport_map array.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40045",
"url": "https://www.suse.com/security/cve/CVE-2025-40045"
},
{
"category": "external",
"summary": "SUSE Bug 1252784 for CVE-2025-40045",
"url": "https://bugzilla.suse.com/1252784"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40045"
},
{
"cve": "CVE-2025-40046",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40046"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring/zcrx: fix overshooting recv limit\n\nIt\u0027s reported that sometimes a zcrx request can receive more than was\nrequested. It\u0027s caused by io_zcrx_recv_skb() adjusting desc-\u003ecount for\nall received buffers including frag lists, but then doing recursive\ncalls to process frag list skbs, which leads to desc-\u003ecount double\naccounting and underflow.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40046",
"url": "https://www.suse.com/security/cve/CVE-2025-40046"
},
{
"category": "external",
"summary": "SUSE Bug 1252791 for CVE-2025-40046",
"url": "https://bugzilla.suse.com/1252791"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40046"
},
{
"cve": "CVE-2025-40047",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40047"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring/waitid: always prune wait queue entry in io_waitid_wait()\n\nFor a successful return, always remove our entry from the wait queue\nentry list. Previously this was skipped if a cancelation was in\nprogress, but this can race with another invocation of the wait queue\nentry callback.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40047",
"url": "https://www.suse.com/security/cve/CVE-2025-40047"
},
{
"category": "external",
"summary": "SUSE Bug 1252790 for CVE-2025-40047",
"url": "https://bugzilla.suse.com/1252790"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40047"
},
{
"cve": "CVE-2025-40048",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40048"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nuio_hv_generic: Let userspace take care of interrupt mask\n\nRemove the logic to set interrupt mask by default in uio_hv_generic\ndriver as the interrupt mask value is supposed to be controlled\ncompletely by the user space. If the mask bit gets changed\nby the driver, concurrently with user mode operating on the ring,\nthe mask bit may be set when it is supposed to be clear, and the\nuser-mode driver will miss an interrupt which will cause a hang.\n\nFor eg- when the driver sets inbound ring buffer interrupt mask to 1,\nthe host does not interrupt the guest on the UIO VMBus channel.\nHowever, setting the mask does not prevent the host from putting a\nmessage in the inbound ring buffer. So let\u0027s assume that happens,\nthe host puts a message into the ring buffer but does not interrupt.\n\nSubsequently, the user space code in the guest sets the inbound ring\nbuffer interrupt mask to 0, saying \"Hey, I\u0027m ready for interrupts\".\nUser space code then calls pread() to wait for an interrupt.\nThen one of two things happens:\n\n* The host never sends another message. So the pread() waits forever.\n* The host does send another message. But because there\u0027s already a\n message in the ring buffer, it doesn\u0027t generate an interrupt.\n This is the correct behavior, because the host should only send an\n interrupt when the inbound ring buffer transitions from empty to\n not-empty. Adding an additional message to a ring buffer that is not\n empty is not supposed to generate an interrupt on the guest.\n Since the guest is waiting in pread() and not removing messages from\n the ring buffer, the pread() waits forever.\n\nThis could be easily reproduced in hv_fcopy_uio_daemon if we delay\nsetting interrupt mask to 0.\n\nSimilarly if hv_uio_channel_cb() sets the interrupt_mask to 1,\nthere\u0027s a race condition. Once user space empties the inbound ring\nbuffer, but before user space sets interrupt_mask to 0, the host could\nput another message in the ring buffer but it wouldn\u0027t interrupt.\nThen the next pread() would hang.\n\nFix these by removing all instances where interrupt_mask is changed,\nwhile keeping the one in set_event() unchanged to enable userspace\ncontrol the interrupt mask by writing 0/1 to /dev/uioX.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40048",
"url": "https://www.suse.com/security/cve/CVE-2025-40048"
},
{
"category": "external",
"summary": "SUSE Bug 1252862 for CVE-2025-40048",
"url": "https://bugzilla.suse.com/1252862"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40048"
},
{
"cve": "CVE-2025-40049",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40049"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nSquashfs: fix uninit-value in squashfs_get_parent\n\nSyzkaller reports a \"KMSAN: uninit-value in squashfs_get_parent\" bug.\n\nThis is caused by open_by_handle_at() being called with a file handle\ncontaining an invalid parent inode number. In particular the inode number\nis that of a symbolic link, rather than a directory.\n\nSquashfs_get_parent() gets called with that symbolic link inode, and\naccesses the parent member field.\n\n\tunsigned int parent_ino = squashfs_i(inode)-\u003eparent;\n\nBecause non-directory inodes in Squashfs do not have a parent value, this\nis uninitialised, and this causes an uninitialised value access.\n\nThe fix is to initialise parent with the invalid inode 0, which will cause\nan EINVAL error to be returned.\n\nRegular inodes used to share the parent field with the block_list_start\nfield. This is removed in this commit to enable the parent field to\ncontain the invalid inode number 0.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40049",
"url": "https://www.suse.com/security/cve/CVE-2025-40049"
},
{
"category": "external",
"summary": "SUSE Bug 1252822 for CVE-2025-40049",
"url": "https://bugzilla.suse.com/1252822"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40049"
},
{
"cve": "CVE-2025-40050",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40050"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Skip scalar adjustment for BPF_NEG if dst is a pointer\n\nIn check_alu_op(), the verifier currently calls check_reg_arg() and\nadjust_scalar_min_max_vals() unconditionally for BPF_NEG operations.\nHowever, if the destination register holds a pointer, these scalar\nadjustments are unnecessary and potentially incorrect.\n\nThis patch adds a check to skip the adjustment logic when the destination\nregister contains a pointer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40050",
"url": "https://www.suse.com/security/cve/CVE-2025-40050"
},
{
"category": "external",
"summary": "SUSE Bug 1252856 for CVE-2025-40050",
"url": "https://bugzilla.suse.com/1252856"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40050"
},
{
"cve": "CVE-2025-40051",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40051"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvhost: vringh: Modify the return value check\n\nThe return value of copy_from_iter and copy_to_iter can\u0027t be negative,\ncheck whether the copied lengths are equal.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40051",
"url": "https://www.suse.com/security/cve/CVE-2025-40051"
},
{
"category": "external",
"summary": "SUSE Bug 1252858 for CVE-2025-40051",
"url": "https://bugzilla.suse.com/1252858"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40051"
},
{
"cve": "CVE-2025-40052",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40052"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: fix crypto buffers in non-linear memory\n\nThe crypto API, through the scatterlist API, expects input buffers to be\nin linear memory. We handle this with the cifs_sg_set_buf() helper\nthat converts vmalloc\u0027d memory to their corresponding pages.\n\nHowever, when we allocate our aead_request buffer (@creq in\nsmb2ops.c::crypt_message()), we do so with kvzalloc(), which possibly\nputs aead_request-\u003e__ctx in vmalloc area.\n\nAEAD algorithm then uses -\u003e__ctx for its private/internal data and\noperations, and uses sg_set_buf() for such data on a few places.\n\nThis works fine as long as @creq falls into kmalloc zone (small\nrequests) or vmalloc\u0027d memory is still within linear range.\n\nTasks\u0027 stacks are vmalloc\u0027d by default (CONFIG_VMAP_STACK=y), so too\nmany tasks will increment the base stacks\u0027 addresses to a point where\nvirt_addr_valid(buf) will fail (BUG() in sg_set_buf()) when that\nhappens.\n\nIn practice: too many parallel reads and writes on an encrypted mount\nwill trigger this bug.\n\nTo fix this, always alloc @creq with kmalloc() instead.\nAlso drop the @sensitive_size variable/arguments since\nkfree_sensitive() doesn\u0027t need it.\n\nBacktrace:\n\n[ 945.272081] ------------[ cut here ]------------\n[ 945.272774] kernel BUG at include/linux/scatterlist.h:209!\n[ 945.273520] Oops: invalid opcode: 0000 [#1] SMP DEBUG_PAGEALLOC NOPTI\n[ 945.274412] CPU: 7 UID: 0 PID: 56 Comm: kworker/u33:0 Kdump: loaded Not tainted 6.15.0-lku-11779-g8e9d6efccdd7-dirty #1 PREEMPT(voluntary)\n[ 945.275736] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.16.3-2-gc13ff2cd-prebuilt.qemu.org 04/01/2014\n[ 945.276877] Workqueue: writeback wb_workfn (flush-cifs-2)\n[ 945.277457] RIP: 0010:crypto_gcm_init_common+0x1f9/0x220\n[ 945.278018] Code: b0 00 00 00 48 83 c4 08 5b 5d 41 5c 41 5d 41 5e 41 5f c3 cc cc cc cc 48 c7 c0 00 00 00 80 48 2b 05 5c 58 e5 00 e9 58 ff ff ff \u003c0f\u003e 0b 0f 0b 0f 0b 0f 0b 0f 0b 0f 0b 48 c7 04 24 01 00 00 00 48 8b\n[ 945.279992] RSP: 0018:ffffc90000a27360 EFLAGS: 00010246\n[ 945.280578] RAX: 0000000000000000 RBX: ffffc90001d85060 RCX: 0000000000000030\n[ 945.281376] RDX: 0000000000080000 RSI: 0000000000000000 RDI: ffffc90081d85070\n[ 945.282145] RBP: ffffc90001d85010 R08: ffffc90001d85000 R09: 0000000000000000\n[ 945.282898] R10: ffffc90001d85090 R11: 0000000000001000 R12: ffffc90001d85070\n[ 945.283656] R13: ffff888113522948 R14: ffffc90001d85060 R15: ffffc90001d85010\n[ 945.284407] FS: 0000000000000000(0000) GS:ffff8882e66cf000(0000) knlGS:0000000000000000\n[ 945.285262] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 945.285884] CR2: 00007fa7ffdd31f4 CR3: 000000010540d000 CR4: 0000000000350ef0\n[ 945.286683] Call Trace:\n[ 945.286952] \u003cTASK\u003e\n[ 945.287184] ? crypt_message+0x33f/0xad0 [cifs]\n[ 945.287719] crypto_gcm_encrypt+0x36/0xe0\n[ 945.288152] crypt_message+0x54a/0xad0 [cifs]\n[ 945.288724] smb3_init_transform_rq+0x277/0x300 [cifs]\n[ 945.289300] smb_send_rqst+0xa3/0x160 [cifs]\n[ 945.289944] cifs_call_async+0x178/0x340 [cifs]\n[ 945.290514] ? __pfx_smb2_writev_callback+0x10/0x10 [cifs]\n[ 945.291177] smb2_async_writev+0x3e3/0x670 [cifs]\n[ 945.291759] ? find_held_lock+0x32/0x90\n[ 945.292212] ? netfs_advance_write+0xf2/0x310\n[ 945.292723] netfs_advance_write+0xf2/0x310\n[ 945.293210] netfs_write_folio+0x346/0xcc0\n[ 945.293689] ? __pfx__raw_spin_unlock_irq+0x10/0x10\n[ 945.294250] netfs_writepages+0x117/0x460\n[ 945.294724] do_writepages+0xbe/0x170\n[ 945.295152] ? find_held_lock+0x32/0x90\n[ 945.295600] ? kvm_sched_clock_read+0x11/0x20\n[ 945.296103] __writeback_single_inode+0x56/0x4b0\n[ 945.296643] writeback_sb_inodes+0x229/0x550\n[ 945.297140] __writeback_inodes_wb+0x4c/0xe0\n[ 945.297642] wb_writeback+0x2f1/0x3f0\n[ 945.298069] wb_workfn+0x300/0x490\n[ 945.298472] process_one_work+0x1fe/0x590\n[ 945.298949] worker_thread+0x1ce/0x3c0\n[ 945.299397] ? __pfx_worker_thread+0x10/0x10\n[ 945.299900] kthr\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40052",
"url": "https://www.suse.com/security/cve/CVE-2025-40052"
},
{
"category": "external",
"summary": "SUSE Bug 1252851 for CVE-2025-40052",
"url": "https://bugzilla.suse.com/1252851"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40052"
},
{
"cve": "CVE-2025-40053",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40053"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: dlink: handle copy_thresh allocation failure\n\nThe driver did not handle failure of `netdev_alloc_skb_ip_align()`.\nIf the allocation failed, dereferencing `skb-\u003eprotocol` could lead to\na NULL pointer dereference.\n\nThis patch tries to allocate `skb`. If the allocation fails, it falls\nback to the normal path.\n\nTested-on: D-Link DGE-550T Rev-A3",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40053",
"url": "https://www.suse.com/security/cve/CVE-2025-40053"
},
{
"category": "external",
"summary": "SUSE Bug 1252808 for CVE-2025-40053",
"url": "https://bugzilla.suse.com/1252808"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40053"
},
{
"cve": "CVE-2025-40054",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40054"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nf2fs: fix UAF issue in f2fs_merge_page_bio()\n\nAs JY reported in bugzilla [1],\n\nUnable to handle kernel NULL pointer dereference at virtual address 0000000000000000\npc : [0xffffffe51d249484] f2fs_is_cp_guaranteed+0x70/0x98\nlr : [0xffffffe51d24adbc] f2fs_merge_page_bio+0x520/0x6d4\nCPU: 3 UID: 0 PID: 6790 Comm: kworker/u16:3 Tainted: P B W OE 6.12.30-android16-5-maybe-dirty-4k #1 5f7701c9cbf727d1eebe77c89bbbeb3371e895e5\nTainted: [P]=PROPRIETARY_MODULE, [B]=BAD_PAGE, [W]=WARN, [O]=OOT_MODULE, [E]=UNSIGNED_MODULE\nWorkqueue: writeback wb_workfn (flush-254:49)\nCall trace:\n f2fs_is_cp_guaranteed+0x70/0x98\n f2fs_inplace_write_data+0x174/0x2f4\n f2fs_do_write_data_page+0x214/0x81c\n f2fs_write_single_data_page+0x28c/0x764\n f2fs_write_data_pages+0x78c/0xce4\n do_writepages+0xe8/0x2fc\n __writeback_single_inode+0x4c/0x4b4\n writeback_sb_inodes+0x314/0x540\n __writeback_inodes_wb+0xa4/0xf4\n wb_writeback+0x160/0x448\n wb_workfn+0x2f0/0x5dc\n process_scheduled_works+0x1c8/0x458\n worker_thread+0x334/0x3f0\n kthread+0x118/0x1ac\n ret_from_fork+0x10/0x20\n\n[1] https://bugzilla.kernel.org/show_bug.cgi?id=220575\n\nThe panic was caused by UAF issue w/ below race condition:\n\nkworker\n- writepages\n - f2fs_write_cache_pages\n - f2fs_write_single_data_page\n - f2fs_do_write_data_page\n - f2fs_inplace_write_data\n - f2fs_merge_page_bio\n - add_inu_page\n : cache page #1 into bio \u0026 cache bio in\n io-\u003ebio_list\n - f2fs_write_single_data_page\n - f2fs_do_write_data_page\n - f2fs_inplace_write_data\n - f2fs_merge_page_bio\n - add_inu_page\n : cache page #2 into bio which is linked\n in io-\u003ebio_list\n\t\t\t\t\t\twrite\n\t\t\t\t\t\t- f2fs_write_begin\n\t\t\t\t\t\t: write page #1\n\t\t\t\t\t\t - f2fs_folio_wait_writeback\n\t\t\t\t\t\t - f2fs_submit_merged_ipu_write\n\t\t\t\t\t\t - f2fs_submit_write_bio\n\t\t\t\t\t\t : submit bio which inclues page #1 and #2\n\n\t\t\t\t\t\tsoftware IRQ\n\t\t\t\t\t\t- f2fs_write_end_io\n\t\t\t\t\t\t - fscrypt_free_bounce_page\n\t\t\t\t\t\t : freed bounced page which belongs to page #2\n - inc_page_count( , WB_DATA_TYPE(data_folio), false)\n : data_folio points to fio-\u003eencrypted_page\n the bounced page can be freed before\n accessing it in f2fs_is_cp_guarantee()\n\nIt can reproduce w/ below testcase:\nRun below script in shell #1:\nfor ((i=1;i\u003e0;i++)) do xfs_io -f /mnt/f2fs/enc/file \\\n-c \"pwrite 0 32k\" -c \"fdatasync\"\n\nRun below script in shell #2:\nfor ((i=1;i\u003e0;i++)) do xfs_io -f /mnt/f2fs/enc/file \\\n-c \"pwrite 0 32k\" -c \"fdatasync\"\n\nSo, in f2fs_merge_page_bio(), let\u0027s avoid using fio-\u003eencrypted_page after\ncommit page into internal ipu cache.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40054",
"url": "https://www.suse.com/security/cve/CVE-2025-40054"
},
{
"category": "external",
"summary": "SUSE Bug 1252853 for CVE-2025-40054",
"url": "https://bugzilla.suse.com/1252853"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40054"
},
{
"cve": "CVE-2025-40055",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40055"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocfs2: fix double free in user_cluster_connect()\n\nuser_cluster_disconnect() frees \"conn-\u003ecc_private\" which is \"lc\" but then\nthe error handling frees \"lc\" a second time. Set \"lc\" to NULL on this\npath to avoid a double free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40055",
"url": "https://www.suse.com/security/cve/CVE-2025-40055"
},
{
"category": "external",
"summary": "SUSE Bug 1252821 for CVE-2025-40055",
"url": "https://bugzilla.suse.com/1252821"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40055"
},
{
"cve": "CVE-2025-40056",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40056"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvhost: vringh: Fix copy_to_iter return value check\n\nThe return value of copy_to_iter can\u0027t be negative, check whether the\ncopied length is equal to the requested length instead of checking for\nnegative values.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40056",
"url": "https://www.suse.com/security/cve/CVE-2025-40056"
},
{
"category": "external",
"summary": "SUSE Bug 1252826 for CVE-2025-40056",
"url": "https://bugzilla.suse.com/1252826"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40056"
},
{
"cve": "CVE-2025-40057",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40057"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nptp: Add a upper bound on max_vclocks\n\nsyzbot reported WARNING in max_vclocks_store.\n\nThis occurs when the argument max is too large for kcalloc to handle.\n\nExtend the guard to guard against values that are too large for\nkcalloc",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40057",
"url": "https://www.suse.com/security/cve/CVE-2025-40057"
},
{
"category": "external",
"summary": "SUSE Bug 1252825 for CVE-2025-40057",
"url": "https://bugzilla.suse.com/1252825"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40057"
},
{
"cve": "CVE-2025-40058",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40058"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\niommu/vt-d: Disallow dirty tracking if incoherent page walk\n\nDirty page tracking relies on the IOMMU atomically updating the dirty bit\nin the paging-structure entry. For this operation to succeed, the paging-\nstructure memory must be coherent between the IOMMU and the CPU. In\nanother word, if the iommu page walk is incoherent, dirty page tracking\ndoesn\u0027t work.\n\nThe Intel VT-d specification, Section 3.10 \"Snoop Behavior\" states:\n\n\"Remapping hardware encountering the need to atomically update A/EA/D bits\n in a paging-structure entry that is not snooped will result in a non-\n recoverable fault.\"\n\nTo prevent an IOMMU from being incorrectly configured for dirty page\ntracking when it is operating in an incoherent mode, mark SSADS as\nsupported only when both ecap_slads and ecap_smpwc are supported.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40058",
"url": "https://www.suse.com/security/cve/CVE-2025-40058"
},
{
"category": "external",
"summary": "SUSE Bug 1252854 for CVE-2025-40058",
"url": "https://bugzilla.suse.com/1252854"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40058"
},
{
"cve": "CVE-2025-40059",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40059"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncoresight: Fix incorrect handling for return value of devm_kzalloc\n\nThe return value of devm_kzalloc could be an null pointer,\nuse \"!desc.pdata\" to fix incorrect handling return value\nof devm_kzalloc.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40059",
"url": "https://www.suse.com/security/cve/CVE-2025-40059"
},
{
"category": "external",
"summary": "SUSE Bug 1252809 for CVE-2025-40059",
"url": "https://bugzilla.suse.com/1252809"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40059"
},
{
"cve": "CVE-2025-40060",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40060"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncoresight: trbe: Return NULL pointer for allocation failures\n\nWhen the TRBE driver fails to allocate a buffer, it currently returns\nthe error code \"-ENOMEM\". However, the caller etm_setup_aux() only\nchecks for a NULL pointer, so it misses the error. As a result, the\ndriver continues and eventually causes a kernel panic.\n\nFix this by returning a NULL pointer from arm_trbe_alloc_buffer() on\nallocation failures. This allows that the callers can properly handle\nthe failure.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40060",
"url": "https://www.suse.com/security/cve/CVE-2025-40060"
},
{
"category": "external",
"summary": "SUSE Bug 1252848 for CVE-2025-40060",
"url": "https://bugzilla.suse.com/1252848"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40060"
},
{
"cve": "CVE-2025-40061",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40061"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/rxe: Fix race in do_task() when draining\n\nWhen do_task() exhausts its iteration budget (!ret), it sets the state\nto TASK_STATE_IDLE to reschedule, without a secondary check on the\ncurrent task-\u003estate. This can overwrite the TASK_STATE_DRAINING state\nset by a concurrent call to rxe_cleanup_task() or rxe_disable_task().\n\nWhile state changes are protected by a spinlock, both rxe_cleanup_task()\nand rxe_disable_task() release the lock while waiting for the task to\nfinish draining in the while(!is_done(task)) loop. The race occurs if\ndo_task() hits its iteration limit and acquires the lock in this window.\nThe cleanup logic may then proceed while the task incorrectly\nreschedules itself, leading to a potential use-after-free.\n\nThis bug was introduced during the migration from tasklets to workqueues,\nwhere the special handling for the draining case was lost.\n\nFix this by restoring the original pre-migration behavior. If the state is\nTASK_STATE_DRAINING when iterations are exhausted, set cont to 1 to\nforce a new loop iteration. This allows the task to finish its work, so\nthat a subsequent iteration can reach the switch statement and correctly\ntransition the state to TASK_STATE_DRAINED, stopping the task as intended.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40061",
"url": "https://www.suse.com/security/cve/CVE-2025-40061"
},
{
"category": "external",
"summary": "SUSE Bug 1252849 for CVE-2025-40061",
"url": "https://bugzilla.suse.com/1252849"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40061"
},
{
"cve": "CVE-2025-40062",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40062"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: hisilicon/qm - set NULL to qm-\u003edebug.qm_diff_regs\n\nWhen the initialization of qm-\u003edebug.acc_diff_reg fails,\nthe probe process does not exit. However, after qm-\u003edebug.qm_diff_regs is\nfreed, it is not set to NULL. This can lead to a double free when the\nremove process attempts to free it again. Therefore, qm-\u003edebug.qm_diff_regs\nshould be set to NULL after it is freed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40062",
"url": "https://www.suse.com/security/cve/CVE-2025-40062"
},
{
"category": "external",
"summary": "SUSE Bug 1252850 for CVE-2025-40062",
"url": "https://bugzilla.suse.com/1252850"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40062"
},
{
"cve": "CVE-2025-40063",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40063"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: comp - Use same definition of context alloc and free ops\n\nIn commit 42d9f6c77479 (\"crypto: acomp - Move scomp stream allocation\ncode into acomp\"), the crypto_acomp_streams struct was made to rely on\nhaving the alloc_ctx and free_ctx operations defined in the same order\nas the scomp_alg struct. But in that same commit, the alloc_ctx and\nfree_ctx members of scomp_alg may be randomized by structure layout\nrandomization, since they are contained in a pure ops structure\n(containing only function pointers). If the pointers within scomp_alg\nare randomized, but those in crypto_acomp_streams are not, then\nthe order may no longer match. This fixes the problem by removing the\nunion from scomp_alg so that both crypto_acomp_streams and scomp_alg\nwill share the same definition of alloc_ctx and free_ctx, ensuring\nthey will always have the same layout.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40063",
"url": "https://www.suse.com/security/cve/CVE-2025-40063"
},
{
"category": "external",
"summary": "SUSE Bug 1252844 for CVE-2025-40063",
"url": "https://bugzilla.suse.com/1252844"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40063"
},
{
"cve": "CVE-2025-40064",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40064"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Fix use-after-free in __pnet_find_base_ndev().\n\nsyzbot reported use-after-free of net_device in __pnet_find_base_ndev(),\nwhich was called during connect(). [0]\n\nsmc_pnet_find_ism_resource() fetches sk_dst_get(sk)-\u003edev and passes\ndown to pnet_find_base_ndev(), where RTNL is held. Then, UAF happened\nat __pnet_find_base_ndev() when the dev is first used.\n\nThis means dev had already been freed before acquiring RTNL in\npnet_find_base_ndev().\n\nWhile dev is going away, dst-\u003edev could be swapped with blackhole_netdev,\nand the dev\u0027s refcnt by dst will be released.\n\nWe must hold dev\u0027s refcnt before calling smc_pnet_find_ism_resource().\n\nAlso, smc_pnet_find_roce_resource() has the same problem.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu() in the two functions.\n\n[0]:\nBUG: KASAN: use-after-free in __pnet_find_base_ndev+0x1b1/0x1c0 net/smc/smc_pnet.c:926\nRead of size 1 at addr ffff888036bac33a by task syz.0.3632/18609\n\nCPU: 1 UID: 0 PID: 18609 Comm: syz.0.3632 Not tainted syzkaller #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025\nCall Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:378 [inline]\n print_report+0xca/0x240 mm/kasan/report.c:482\n kasan_report+0x118/0x150 mm/kasan/report.c:595\n __pnet_find_base_ndev+0x1b1/0x1c0 net/smc/smc_pnet.c:926\n pnet_find_base_ndev net/smc/smc_pnet.c:946 [inline]\n smc_pnet_find_ism_by_pnetid net/smc/smc_pnet.c:1103 [inline]\n smc_pnet_find_ism_resource+0xef/0x390 net/smc/smc_pnet.c:1154\n smc_find_ism_device net/smc/af_smc.c:1030 [inline]\n smc_find_proposal_devices net/smc/af_smc.c:1115 [inline]\n __smc_connect+0x372/0x1890 net/smc/af_smc.c:1545\n smc_connect+0x877/0xd90 net/smc/af_smc.c:1715\n __sys_connect_file net/socket.c:2086 [inline]\n __sys_connect+0x313/0x440 net/socket.c:2105\n __do_sys_connect net/socket.c:2111 [inline]\n __se_sys_connect net/socket.c:2108 [inline]\n __x64_sys_connect+0x7a/0x90 net/socket.c:2108\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7f47cbf8eba9\nCode: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007f47ccdb1038 EFLAGS: 00000246 ORIG_RAX: 000000000000002a\nRAX: ffffffffffffffda RBX: 00007f47cc1d5fa0 RCX: 00007f47cbf8eba9\nRDX: 0000000000000010 RSI: 0000200000000280 RDI: 000000000000000b\nRBP: 00007f47cc011e19 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000\nR13: 00007f47cc1d6038 R14: 00007f47cc1d5fa0 R15: 00007ffc512f8aa8\n \u003c/TASK\u003e\n\nThe buggy address belongs to the physical page:\npage: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff888036bacd00 pfn:0x36bac\nflags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)\nraw: 00fff00000000000 ffffea0001243d08 ffff8880b863fdc0 0000000000000000\nraw: ffff888036bacd00 0000000000000000 00000000ffffffff 0000000000000000\npage dumped because: kasan: bad access detected\npage_owner tracks the page as freed\npage last allocated via order 2, migratetype Unmovable, gfp_mask 0x446dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO|__GFP_NOWARN|__GFP_RETRY_MAYFAIL|__GFP_COMP), pid 16741, tgid 16741 (syz-executor), ts 343313197788, free_ts 380670750466\n set_page_owner include/linux/page_owner.h:32 [inline]\n post_alloc_hook+0x240/0x2a0 mm/page_alloc.c:1851\n prep_new_page mm/page_alloc.c:1859 [inline]\n get_page_from_freelist+0x21e4/0x22c0 mm/page_alloc.c:3858\n __alloc_frozen_pages_noprof+0x181/0x370 mm/page_alloc.c:5148\n alloc_pages_mpol+0x232/0x4a0 mm/mempolicy.c:2416\n ___kmalloc_large_node+0x5f/0x1b0 mm/slub.c:4317\n __kmalloc_large_node_noprof+0x18/0x90 mm/slub.c:4348\n __do_kmalloc_node mm/slub.c:4364 [inline]\n __kvmalloc_node\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40064",
"url": "https://www.suse.com/security/cve/CVE-2025-40064"
},
{
"category": "external",
"summary": "SUSE Bug 1252845 for CVE-2025-40064",
"url": "https://bugzilla.suse.com/1252845"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40064"
},
{
"cve": "CVE-2025-40065",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40065"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRISC-V: KVM: Write hgatp register with valid mode bits\n\nAccording to the RISC-V Privileged Architecture Spec, when MODE=Bare\nis selected,software must write zero to the remaining fields of hgatp.\n\nWe have detected the valid mode supported by the HW before, So using a\nvalid mode to detect how many vmid bits are supported.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40065",
"url": "https://www.suse.com/security/cve/CVE-2025-40065"
},
{
"category": "external",
"summary": "SUSE Bug 1252846 for CVE-2025-40065",
"url": "https://bugzilla.suse.com/1252846"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40065"
},
{
"cve": "CVE-2025-40066",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40066"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mt76: mt7996: Check phy before init msta_link in mt7996_mac_sta_add_links()\n\nIn order to avoid a possible NULL pointer dereference in\nmt7996_mac_sta_init_link routine, move the phy pointer check before\nrunning mt7996_mac_sta_init_link() in mt7996_mac_sta_add_links routine.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40066",
"url": "https://www.suse.com/security/cve/CVE-2025-40066"
},
{
"category": "external",
"summary": "SUSE Bug 1252842 for CVE-2025-40066",
"url": "https://bugzilla.suse.com/1252842"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40066"
},
{
"cve": "CVE-2025-40067",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40067"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/ntfs3: reject index allocation if $BITMAP is empty but blocks exist\n\nIndex allocation requires at least one bit in the $BITMAP attribute to\ntrack usage of index entries. If the bitmap is empty while index blocks\nare already present, this reflects on-disk corruption.\n\nsyzbot triggered this condition using a malformed NTFS image. During a\nrename() operation involving a long filename (which spans multiple\nindex entries), the empty bitmap allowed the name to be added without\nvalid tracking. Subsequent deletion of the original entry failed with\n-ENOENT, due to unexpected index state.\n\nReject such cases by verifying that the bitmap is not empty when index\nblocks exist.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40067",
"url": "https://www.suse.com/security/cve/CVE-2025-40067"
},
{
"category": "external",
"summary": "SUSE Bug 1252840 for CVE-2025-40067",
"url": "https://bugzilla.suse.com/1252840"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40067"
},
{
"cve": "CVE-2025-40068",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40068"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs: ntfs3: Fix integer overflow in run_unpack()\n\nThe MFT record relative to the file being opened contains its runlist,\nan array containing information about the file\u0027s location on the physical\ndisk. Analysis of all Call Stack paths showed that the values of the\nrunlist array, from which LCNs are calculated, are not validated before\nrun_unpack function.\n\nThe run_unpack function decodes the compressed runlist data format\nfrom MFT attributes (for example, $DATA), converting them into a runs_tree\nstructure, which describes the mapping of virtual clusters (VCN) to\nlogical clusters (LCN). The NTFS3 subsystem also has a shortcut for\ndeleting files from MFT records - in this case, the RUN_DEALLOCATE\ncommand is sent to the run_unpack input, and the function logic\nprovides that all data transferred to the runlist about file or\ndirectory is deleted without creating a runs_tree structure.\n\nSubstituting the runlist in the $DATA attribute of the MFT record for an\narbitrary file can lead either to access to arbitrary data on the disk\nbypassing access checks to them (since the inode access check\noccurs above) or to destruction of arbitrary data on the disk.\n\nAdd overflow check for addition operation.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40068",
"url": "https://www.suse.com/security/cve/CVE-2025-40068"
},
{
"category": "external",
"summary": "SUSE Bug 1252843 for CVE-2025-40068",
"url": "https://bugzilla.suse.com/1252843"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40068"
},
{
"cve": "CVE-2025-40069",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40069"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/msm: Fix obj leak in VM_BIND error path\n\nIf we fail a handle-lookup part way thru, we need to drop the already\nobtained obj references.\n\nPatchwork: https://patchwork.freedesktop.org/patch/669784/",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40069",
"url": "https://www.suse.com/security/cve/CVE-2025-40069"
},
{
"category": "external",
"summary": "SUSE Bug 1252831 for CVE-2025-40069",
"url": "https://bugzilla.suse.com/1252831"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40069"
},
{
"cve": "CVE-2025-40070",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40070"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npps: fix warning in pps_register_cdev when register device fail\n\nSimilar to previous commit 2a934fdb01db (\"media: v4l2-dev: fix error\nhandling in __video_register_device()\"), the release hook should be set\nbefore device_register(). Otherwise, when device_register() return error\nand put_device() try to callback the release function, the below warning\nmay happen.\n\n ------------[ cut here ]------------\n WARNING: CPU: 1 PID: 4760 at drivers/base/core.c:2567 device_release+0x1bd/0x240 drivers/base/core.c:2567\n Modules linked in:\n CPU: 1 UID: 0 PID: 4760 Comm: syz.4.914 Not tainted 6.17.0-rc3+ #1 NONE\n RIP: 0010:device_release+0x1bd/0x240 drivers/base/core.c:2567\n Call Trace:\n \u003cTASK\u003e\n kobject_cleanup+0x136/0x410 lib/kobject.c:689\n kobject_release lib/kobject.c:720 [inline]\n kref_put include/linux/kref.h:65 [inline]\n kobject_put+0xe9/0x130 lib/kobject.c:737\n put_device+0x24/0x30 drivers/base/core.c:3797\n pps_register_cdev+0x2da/0x370 drivers/pps/pps.c:402\n pps_register_source+0x2f6/0x480 drivers/pps/kapi.c:108\n pps_tty_open+0x190/0x310 drivers/pps/clients/pps-ldisc.c:57\n tty_ldisc_open+0xa7/0x120 drivers/tty/tty_ldisc.c:432\n tty_set_ldisc+0x333/0x780 drivers/tty/tty_ldisc.c:563\n tiocsetd drivers/tty/tty_io.c:2429 [inline]\n tty_ioctl+0x5d1/0x1700 drivers/tty/tty_io.c:2728\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:598 [inline]\n __se_sys_ioctl fs/ioctl.c:584 [inline]\n __x64_sys_ioctl+0x194/0x210 fs/ioctl.c:584\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0x5f/0x2a0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n \u003c/TASK\u003e\n\nBefore commit c79a39dc8d06 (\"pps: Fix a use-after-free\"),\npps_register_cdev() call device_create() to create pps-\u003edev, which will\ninit dev-\u003erelease to device_create_release(). Now the comment is outdated,\njust remove it.\n\nThanks for the reminder from Calvin Owens, \u0027kfree_pps\u0027 should be removed\nin pps_register_source() to avoid a double free in the failure case.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40070",
"url": "https://www.suse.com/security/cve/CVE-2025-40070"
},
{
"category": "external",
"summary": "SUSE Bug 1252836 for CVE-2025-40070",
"url": "https://bugzilla.suse.com/1252836"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40070"
},
{
"cve": "CVE-2025-40071",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40071"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntty: n_gsm: Don\u0027t block input queue by waiting MSC\n\nCurrently gsm_queue() processes incoming frames and when opening\na DLC channel it calls gsm_dlci_open() which calls gsm_modem_update().\nIf basic mode is used it calls gsm_modem_upd_via_msc() and it\ncannot block the input queue by waiting the response to come\ninto the same input queue.\n\nInstead allow sending Modem Status Command without waiting for remote\nend to respond. Define a new function gsm_modem_send_initial_msc()\nfor this purpose. As MSC is only valid for basic encoding, it does\nnot do anything for advanced or when convergence layer type 2 is used.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40071",
"url": "https://www.suse.com/security/cve/CVE-2025-40071"
},
{
"category": "external",
"summary": "SUSE Bug 1252797 for CVE-2025-40071",
"url": "https://bugzilla.suse.com/1252797"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40071"
},
{
"cve": "CVE-2025-40072",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40072"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfanotify: Validate the return value of mnt_ns_from_dentry() before dereferencing\n\nThe function do_fanotify_mark() does not validate if\nmnt_ns_from_dentry() returns NULL before dereferencing mntns-\u003euser_ns.\nThis causes a NULL pointer dereference in do_fanotify_mark() if the\npath is not a mount namespace object.\n\nFix this by checking mnt_ns_from_dentry()\u0027s return value before\ndereferencing it.\n\nBefore the patch\n\n$ gcc fanotify_nullptr.c -o fanotify_nullptr\n$ mkdir A\n$ ./fanotify_nullptr\nFanotify fd: 3\nfanotify_mark: Operation not permitted\n$ unshare -Urm\nFanotify fd: 3\nKilled\n\nint main(void){\n int ffd;\n ffd = fanotify_init(FAN_CLASS_NOTIF | FAN_REPORT_MNT, 0);\n if(ffd \u003c 0){\n perror(\"fanotify_init\");\n exit(EXIT_FAILURE);\n }\n\n printf(\"Fanotify fd: %d\\n\",ffd);\n\n if(fanotify_mark(ffd, FAN_MARK_ADD | FAN_MARK_MNTNS,\nFAN_MNT_ATTACH, AT_FDCWD, \"A\") \u003c 0){\n perror(\"fanotify_mark\");\n exit(EXIT_FAILURE);\n }\n\nreturn 0;\n}\n\nAfter the patch\n\n$ gcc fanotify_nullptr.c -o fanotify_nullptr\n$ mkdir A\n$ ./fanotify_nullptr\nFanotify fd: 3\nfanotify_mark: Operation not permitted\n$ unshare -Urm\nFanotify fd: 3\nfanotify_mark: Invalid argument\n\n[ 25.694973] BUG: kernel NULL pointer dereference, address: 0000000000000038\n[ 25.695006] #PF: supervisor read access in kernel mode\n[ 25.695012] #PF: error_code(0x0000) - not-present page\n[ 25.695017] PGD 109a30067 P4D 109a30067 PUD 142b46067 PMD 0\n[ 25.695025] Oops: Oops: 0000 [#1] SMP NOPTI\n[ 25.695032] CPU: 4 UID: 1000 PID: 1478 Comm: fanotify_nullpt Not\ntainted 6.17.0-rc4 #1 PREEMPT(lazy)\n[ 25.695040] Hardware name: VMware, Inc. VMware Virtual\nPlatform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020\n[ 25.695049] RIP: 0010:do_fanotify_mark+0x817/0x950\n[ 25.695066] Code: 04 00 00 e9 45 fd ff ff 48 8b 7c 24 48 4c 89 54\n24 18 4c 89 5c 24 10 4c 89 0c 24 e8 b3 11 fc ff 4c 8b 54 24 18 4c 8b\n5c 24 10 \u003c48\u003e 8b 78 38 4c 8b 0c 24 49 89 c4 e9 13 fd ff ff 8b 4c 24 28\n85 c9\n[ 25.695081] RSP: 0018:ffffd31c469e3c08 EFLAGS: 00010203\n[ 25.695104] RAX: 0000000000000000 RBX: 0000000001000000 RCX: ffff8eb48aebd220\n[ 25.695110] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff8eb4835e8180\n[ 25.695115] RBP: 0000000000000111 R08: 0000000000000000 R09: 0000000000000000\n[ 25.695142] R10: ffff8eb48a7d56c0 R11: ffff8eb482bede00 R12: 00000000004012a7\n[ 25.695148] R13: 0000000000000110 R14: 0000000000000001 R15: ffff8eb48a7d56c0\n[ 25.695154] FS: 00007f8733bda740(0000) GS:ffff8eb61ce5f000(0000)\nknlGS:0000000000000000\n[ 25.695162] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 25.695170] CR2: 0000000000000038 CR3: 0000000136994006 CR4: 00000000003706f0\n[ 25.695201] Call Trace:\n[ 25.695209] \u003cTASK\u003e\n[ 25.695215] __x64_sys_fanotify_mark+0x1f/0x30\n[ 25.695222] do_syscall_64+0x82/0x2c0\n...",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40072",
"url": "https://www.suse.com/security/cve/CVE-2025-40072"
},
{
"category": "external",
"summary": "SUSE Bug 1252796 for CVE-2025-40072",
"url": "https://bugzilla.suse.com/1252796"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40072"
},
{
"cve": "CVE-2025-40073",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40073"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/msm: Do not validate SSPP when it is not ready\n\nCurrent code will validate current plane and previous plane to\nconfirm they can share a SSPP with multi-rect mode. The SSPP\nis already allocated for previous plane, while current plane\nis not associated with any SSPP yet. Null pointer is referenced\nwhen validating the SSPP of current plane. Skip SSPP validation\nfor current plane.\n\nUnable to handle kernel NULL pointer dereference at virtual address 0000000000000020\nMem abort info:\n ESR = 0x0000000096000004\n EC = 0x25: DABT (current EL), IL = 32 bits\n SET = 0, FnV = 0\n EA = 0, S1PTW = 0\n FSC = 0x04: level 0 translation fault\nData abort info:\n ISV = 0, ISS = 0x00000004, ISS2 = 0x00000000\n CM = 0, WnR = 0, TnD = 0, TagAccess = 0\n GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0\nuser pgtable: 4k pages, 48-bit VAs, pgdp=0000000888ac3000\n[0000000000000020] pgd=0000000000000000, p4d=0000000000000000\nInternal error: Oops: 0000000096000004 [#1] SMP\nModules linked in:\nCPU: 4 UID: 0 PID: 1891 Comm: modetest Tainted: G S 6.15.0-rc2-g3ee3f6e1202e #335 PREEMPT\nTainted: [S]=CPU_OUT_OF_SPEC\nHardware name: SM8650 EV1 rev1 4slam 2et (DT)\npstate: 63400009 (nZCv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--)\npc : dpu_plane_is_multirect_capable+0x68/0x90\nlr : dpu_assign_plane_resources+0x288/0x410\nsp : ffff800093dcb770\nx29: ffff800093dcb770 x28: 0000000000002000 x27: ffff000817c6c000\nx26: ffff000806b46368 x25: ffff0008013f6080 x24: ffff00080cbf4800\nx23: ffff000810842680 x22: ffff0008013f1080 x21: ffff00080cc86080\nx20: ffff000806b463b0 x19: ffff00080cbf5a00 x18: 00000000ffffffff\nx17: 707a5f657a696c61 x16: 0000000000000003 x15: 0000000000002200\nx14: 00000000ffffffff x13: 00aaaaaa00aaaaaa x12: 0000000000000000\nx11: ffff000817c6e2b8 x10: 0000000000000000 x9 : ffff80008106a950\nx8 : ffff00080cbf48f4 x7 : 0000000000000000 x6 : 0000000000000000\nx5 : 0000000000000000 x4 : 0000000000000438 x3 : 0000000000000438\nx2 : ffff800082e245e0 x1 : 0000000000000008 x0 : 0000000000000000\nCall trace:\n dpu_plane_is_multirect_capable+0x68/0x90 (P)\n dpu_crtc_atomic_check+0x5bc/0x650\n drm_atomic_helper_check_planes+0x13c/0x220\n drm_atomic_helper_check+0x58/0xb8\n msm_atomic_check+0xd8/0xf0\n drm_atomic_check_only+0x4a8/0x968\n drm_atomic_commit+0x50/0xd8\n drm_atomic_helper_update_plane+0x140/0x188\n __setplane_atomic+0xfc/0x148\n drm_mode_setplane+0x164/0x378\n drm_ioctl_kernel+0xc0/0x140\n drm_ioctl+0x20c/0x500\n __arm64_sys_ioctl+0xbc/0xf8\n invoke_syscall+0x50/0x120\n el0_svc_common.constprop.0+0x48/0xf8\n do_el0_svc+0x28/0x40\n el0_svc+0x30/0xd0\n el0t_64_sync_handler+0x144/0x168\n el0t_64_sync+0x198/0x1a0\nCode: b9402021 370fffc1 f9401441 3707ff81 (f94010a1)\n---[ end trace 0000000000000000 ]---\n\nPatchwork: https://patchwork.freedesktop.org/patch/669224/",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40073",
"url": "https://www.suse.com/security/cve/CVE-2025-40073"
},
{
"category": "external",
"summary": "SUSE Bug 1252798 for CVE-2025-40073",
"url": "https://bugzilla.suse.com/1252798"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40073"
},
{
"cve": "CVE-2025-40074",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40074"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv4: start using dst_dev_rcu()\n\nChange icmpv4_xrlim_allow(), ip_defrag() to prevent possible UAF.\n\nChange ipmr_prepare_xmit(), ipmr_queue_fwd_xmit(), ip_mr_output(),\nipv4_neigh_lookup() to use lockdep enabled dst_dev_rcu().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40074",
"url": "https://www.suse.com/security/cve/CVE-2025-40074"
},
{
"category": "external",
"summary": "SUSE Bug 1252794 for CVE-2025-40074",
"url": "https://bugzilla.suse.com/1252794"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40074"
},
{
"cve": "CVE-2025-40075",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40075"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp_metrics: use dst_dev_net_rcu()\n\nReplace three dst_dev() with a lockdep enabled helper.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40075",
"url": "https://www.suse.com/security/cve/CVE-2025-40075"
},
{
"category": "external",
"summary": "SUSE Bug 1252795 for CVE-2025-40075",
"url": "https://bugzilla.suse.com/1252795"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40075"
},
{
"cve": "CVE-2025-40076",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40076"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nPCI: rcar-host: Pass proper IRQ domain to generic_handle_domain_irq()\n\nStarting with commit dd26c1a23fd5 (\"PCI: rcar-host: Switch to\nmsi_create_parent_irq_domain()\"), the MSI parent IRQ domain is NULL because\nthe object of type struct irq_domain_info passed to:\n\nmsi_create_parent_irq_domain() -\u003e\n irq_domain_instantiate()() -\u003e\n __irq_domain_instantiate()\n\nhas no reference to the parent IRQ domain. Using msi-\u003edomain-\u003eparent as an\nargument for generic_handle_domain_irq() leads to below error:\n\n\t\"Unable to handle kernel NULL pointer dereference at virtual address\"\n\nThis error was identified while switching the upcoming RZ/G3S PCIe host\ncontroller driver to msi_create_parent_irq_domain() (which was using a\nsimilar pattern to handle MSIs (see link section)), but it was not tested\non hardware using the pcie-rcar-host controller driver due to lack of\nhardware.\n\n[mani: reworded subject and description]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40076",
"url": "https://www.suse.com/security/cve/CVE-2025-40076"
},
{
"category": "external",
"summary": "SUSE Bug 1252792 for CVE-2025-40076",
"url": "https://bugzilla.suse.com/1252792"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40076"
},
{
"cve": "CVE-2025-40077",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40077"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nf2fs: fix to avoid overflow while left shift operation\n\nShould cast type of folio-\u003eindex from pgoff_t to loff_t to avoid overflow\nwhile left shift operation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40077",
"url": "https://www.suse.com/security/cve/CVE-2025-40077"
},
{
"category": "external",
"summary": "SUSE Bug 1252782 for CVE-2025-40077",
"url": "https://bugzilla.suse.com/1252782"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40077"
},
{
"cve": "CVE-2025-40078",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40078"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Explicitly check accesses to bpf_sock_addr\n\nSyzkaller found a kernel warning on the following sock_addr program:\n\n 0: r0 = 0\n 1: r2 = *(u32 *)(r1 +60)\n 2: exit\n\nwhich triggers:\n\n verifier bug: error during ctx access conversion (0)\n\nThis is happening because offset 60 in bpf_sock_addr corresponds to an\nimplicit padding of 4 bytes, right after msg_src_ip4. Access to this\npadding isn\u0027t rejected in sock_addr_is_valid_access and it thus later\nfails to convert the access.\n\nThis patch fixes it by explicitly checking the various fields of\nbpf_sock_addr in sock_addr_is_valid_access.\n\nI checked the other ctx structures and is_valid_access functions and\ndidn\u0027t find any other similar cases. Other cases of (properly handled)\npadding are covered in new tests in a subsequent patch.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40078",
"url": "https://www.suse.com/security/cve/CVE-2025-40078"
},
{
"category": "external",
"summary": "SUSE Bug 1252789 for CVE-2025-40078",
"url": "https://bugzilla.suse.com/1252789"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40078"
},
{
"cve": "CVE-2025-40079",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40079"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nriscv, bpf: Sign extend struct ops return values properly\n\nThe ns_bpf_qdisc selftest triggers a kernel panic:\n\n Unable to handle kernel paging request at virtual address ffffffffa38dbf58\n Current test_progs pgtable: 4K pagesize, 57-bit VAs, pgdp=0x00000001109cc000\n [ffffffffa38dbf58] pgd=000000011fffd801, p4d=000000011fffd401, pud=000000011fffd001, pmd=0000000000000000\n Oops [#1]\n Modules linked in: bpf_testmod(OE) xt_conntrack nls_iso8859_1 [...] [last unloaded: bpf_testmod(OE)]\n CPU: 1 UID: 0 PID: 23584 Comm: test_progs Tainted: G W OE 6.17.0-rc1-g2465bb83e0b4 #1 NONE\n Tainted: [W]=WARN, [O]=OOT_MODULE, [E]=UNSIGNED_MODULE\n Hardware name: Unknown Unknown Product/Unknown Product, BIOS 2024.01+dfsg-1ubuntu5.1 01/01/2024\n epc : __qdisc_run+0x82/0x6f0\n ra : __qdisc_run+0x6e/0x6f0\n epc : ffffffff80bd5c7a ra : ffffffff80bd5c66 sp : ff2000000eecb550\n gp : ffffffff82472098 tp : ff60000096895940 t0 : ffffffff8001f180\n t1 : ffffffff801e1664 t2 : 0000000000000000 s0 : ff2000000eecb5d0\n s1 : ff60000093a6a600 a0 : ffffffffa38dbee8 a1 : 0000000000000001\n a2 : ff2000000eecb510 a3 : 0000000000000001 a4 : 0000000000000000\n a5 : 0000000000000010 a6 : 0000000000000000 a7 : 0000000000735049\n s2 : ffffffffa38dbee8 s3 : 0000000000000040 s4 : ff6000008bcda000\n s5 : 0000000000000008 s6 : ff60000093a6a680 s7 : ff60000093a6a6f0\n s8 : ff60000093a6a6ac s9 : ff60000093140000 s10: 0000000000000000\n s11: ff2000000eecb9d0 t3 : 0000000000000000 t4 : 0000000000ff0000\n t5 : 0000000000000000 t6 : ff60000093a6a8b6\n status: 0000000200000120 badaddr: ffffffffa38dbf58 cause: 000000000000000d\n [\u003cffffffff80bd5c7a\u003e] __qdisc_run+0x82/0x6f0\n [\u003cffffffff80b6fe58\u003e] __dev_queue_xmit+0x4c0/0x1128\n [\u003cffffffff80b80ae0\u003e] neigh_resolve_output+0xd0/0x170\n [\u003cffffffff80d2daf6\u003e] ip6_finish_output2+0x226/0x6c8\n [\u003cffffffff80d31254\u003e] ip6_finish_output+0x10c/0x2a0\n [\u003cffffffff80d31446\u003e] ip6_output+0x5e/0x178\n [\u003cffffffff80d2e232\u003e] ip6_xmit+0x29a/0x608\n [\u003cffffffff80d6f4c6\u003e] inet6_csk_xmit+0xe6/0x140\n [\u003cffffffff80c985e4\u003e] __tcp_transmit_skb+0x45c/0xaa8\n [\u003cffffffff80c995fe\u003e] tcp_connect+0x9ce/0xd10\n [\u003cffffffff80d66524\u003e] tcp_v6_connect+0x4ac/0x5e8\n [\u003cffffffff80cc19b8\u003e] __inet_stream_connect+0xd8/0x318\n [\u003cffffffff80cc1c36\u003e] inet_stream_connect+0x3e/0x68\n [\u003cffffffff80b42b20\u003e] __sys_connect_file+0x50/0x88\n [\u003cffffffff80b42bee\u003e] __sys_connect+0x96/0xc8\n [\u003cffffffff80b42c40\u003e] __riscv_sys_connect+0x20/0x30\n [\u003cffffffff80e5bcae\u003e] do_trap_ecall_u+0x256/0x378\n [\u003cffffffff80e69af2\u003e] handle_exception+0x14a/0x156\n Code: 892a 0363 1205 489c 8bc1 c7e5 2d03 084a 2703 080a (2783) 0709\n ---[ end trace 0000000000000000 ]---\n\nThe bpf_fifo_dequeue prog returns a skb which is a pointer. The pointer\nis treated as a 32bit value and sign extend to 64bit in epilogue. This\nbehavior is right for most bpf prog types but wrong for struct ops which\nrequires RISC-V ABI.\n\nSo let\u0027s sign extend struct ops return values according to the function\nmodel and RISC-V ABI([0]).\n\n [0]: https://riscv.org/wp-content/uploads/2024/12/riscv-calling.pdf",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40079",
"url": "https://www.suse.com/security/cve/CVE-2025-40079"
},
{
"category": "external",
"summary": "SUSE Bug 1252786 for CVE-2025-40079",
"url": "https://bugzilla.suse.com/1252786"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40079"
},
{
"cve": "CVE-2025-40080",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40080"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnbd: restrict sockets to TCP and UDP\n\nRecently, syzbot started to abuse NBD with all kinds of sockets.\n\nCommit cf1b2326b734 (\"nbd: verify socket is supported during setup\")\nmade sure the socket supported a shutdown() method.\n\nExplicitely accept TCP and UNIX stream sockets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40080",
"url": "https://www.suse.com/security/cve/CVE-2025-40080"
},
{
"category": "external",
"summary": "SUSE Bug 1252774 for CVE-2025-40080",
"url": "https://bugzilla.suse.com/1252774"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40080"
},
{
"cve": "CVE-2025-40081",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40081"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nperf: arm_spe: Prevent overflow in PERF_IDX2OFF()\n\nCast nr_pages to unsigned long to avoid overflow when handling large\nAUX buffer sizes (\u003e= 2 GiB).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40081",
"url": "https://www.suse.com/security/cve/CVE-2025-40081"
},
{
"category": "external",
"summary": "SUSE Bug 1252776 for CVE-2025-40081",
"url": "https://bugzilla.suse.com/1252776"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40081"
},
{
"cve": "CVE-2025-40082",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40082"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhfsplus: fix slab-out-of-bounds read in hfsplus_uni2asc()\n\nBUG: KASAN: slab-out-of-bounds in hfsplus_uni2asc+0xa71/0xb90 fs/hfsplus/unicode.c:186\nRead of size 2 at addr ffff8880289ef218 by task syz.6.248/14290\n\nCPU: 0 UID: 0 PID: 14290 Comm: syz.6.248 Not tainted 6.16.4 #1 PREEMPT(full)\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014\nCall Trace:\n \u003cTASK\u003e\n __dump_stack lib/dump_stack.c:94 [inline]\n dump_stack_lvl+0x116/0x1b0 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:378 [inline]\n print_report+0xca/0x5f0 mm/kasan/report.c:482\n kasan_report+0xca/0x100 mm/kasan/report.c:595\n hfsplus_uni2asc+0xa71/0xb90 fs/hfsplus/unicode.c:186\n hfsplus_listxattr+0x5b6/0xbd0 fs/hfsplus/xattr.c:738\n vfs_listxattr+0xbe/0x140 fs/xattr.c:493\n listxattr+0xee/0x190 fs/xattr.c:924\n filename_listxattr fs/xattr.c:958 [inline]\n path_listxattrat+0x143/0x360 fs/xattr.c:988\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xcb/0x4c0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7fe0e9fae16d\nCode: 02 b8 ff ff ff ff c3 66 0f 1f 44 00 00 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007fe0eae67f98 EFLAGS: 00000246 ORIG_RAX: 00000000000000c3\nRAX: ffffffffffffffda RBX: 00007fe0ea205fa0 RCX: 00007fe0e9fae16d\nRDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000200000000000\nRBP: 00007fe0ea0480f0 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000\nR13: 00007fe0ea206038 R14: 00007fe0ea205fa0 R15: 00007fe0eae48000\n \u003c/TASK\u003e\n\nAllocated by task 14290:\n kasan_save_stack+0x24/0x50 mm/kasan/common.c:47\n kasan_save_track+0x14/0x30 mm/kasan/common.c:68\n poison_kmalloc_redzone mm/kasan/common.c:377 [inline]\n __kasan_kmalloc+0xaa/0xb0 mm/kasan/common.c:394\n kasan_kmalloc include/linux/kasan.h:260 [inline]\n __do_kmalloc_node mm/slub.c:4333 [inline]\n __kmalloc_noprof+0x219/0x540 mm/slub.c:4345\n kmalloc_noprof include/linux/slab.h:909 [inline]\n hfsplus_find_init+0x95/0x1f0 fs/hfsplus/bfind.c:21\n hfsplus_listxattr+0x331/0xbd0 fs/hfsplus/xattr.c:697\n vfs_listxattr+0xbe/0x140 fs/xattr.c:493\n listxattr+0xee/0x190 fs/xattr.c:924\n filename_listxattr fs/xattr.c:958 [inline]\n path_listxattrat+0x143/0x360 fs/xattr.c:988\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xcb/0x4c0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nWhen hfsplus_uni2asc is called from hfsplus_listxattr,\nit actually passes in a struct hfsplus_attr_unistr*.\nThe size of the corresponding structure is different from that of hfsplus_unistr,\nso the previous fix (94458781aee6) is insufficient.\nThe pointer on the unicode buffer is still going beyond the allocated memory.\n\nThis patch introduces two warpper functions hfsplus_uni2asc_xattr_str and\nhfsplus_uni2asc_str to process two unicode buffers,\nstruct hfsplus_attr_unistr* and struct hfsplus_unistr* respectively.\nWhen ustrlen value is bigger than the allocated memory size,\nthe ustrlen value is limited to an safe size.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40082",
"url": "https://www.suse.com/security/cve/CVE-2025-40082"
},
{
"category": "external",
"summary": "SUSE Bug 1252775 for CVE-2025-40082",
"url": "https://bugzilla.suse.com/1252775"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40082"
},
{
"cve": "CVE-2025-40084",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40084"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nksmbd: transport_ipc: validate payload size before reading handle\n\nhandle_response() dereferences the payload as a 4-byte handle without\nverifying that the declared payload size is at least 4 bytes. A malformed\nor truncated message from ksmbd.mountd can lead to a 4-byte read past the\ndeclared payload size. Validate the size before dereferencing.\n\nThis is a minimal fix to guard the initial handle read.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40084",
"url": "https://www.suse.com/security/cve/CVE-2025-40084"
},
{
"category": "external",
"summary": "SUSE Bug 1252874 for CVE-2025-40084",
"url": "https://bugzilla.suse.com/1252874"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40084"
},
{
"cve": "CVE-2025-40085",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40085"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: usb-audio: Fix NULL pointer deference in try_to_register_card\n\nIn try_to_register_card(), the return value of usb_ifnum_to_if() is\npassed directly to usb_interface_claimed() without a NULL check, which\nwill lead to a NULL pointer dereference when creating an invalid\nUSB audio device. Fix this by adding a check to ensure the interface\npointer is valid before passing it to usb_interface_claimed().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40085",
"url": "https://www.suse.com/security/cve/CVE-2025-40085"
},
{
"category": "external",
"summary": "SUSE Bug 1252873 for CVE-2025-40085",
"url": "https://bugzilla.suse.com/1252873"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40085"
},
{
"cve": "CVE-2025-40086",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40086"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/xe: Don\u0027t allow evicting of BOs in same VM in array of VM binds\n\nAn array of VM binds can potentially evict other buffer objects (BOs)\nwithin the same VM under certain conditions, which may lead to NULL\npointer dereferences later in the bind pipeline. To prevent this, clear\nthe allow_res_evict flag in the xe_bo_validate call.\n\nv2:\n - Invert polarity of no_res_evict (Thomas)\n - Add comment in code explaining issue (Thomas)\n\n(cherry picked from commit 8b9ba8d6d95fe75fed6b0480bb03da4b321bea08)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40086",
"url": "https://www.suse.com/security/cve/CVE-2025-40086"
},
{
"category": "external",
"summary": "SUSE Bug 1252923 for CVE-2025-40086",
"url": "https://bugzilla.suse.com/1252923"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40086"
},
{
"cve": "CVE-2025-40087",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40087"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFSD: Define a proc_layoutcommit for the FlexFiles layout type\n\nAvoid a crash if a pNFS client should happen to send a LAYOUTCOMMIT\noperation on a FlexFiles layout.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40087",
"url": "https://www.suse.com/security/cve/CVE-2025-40087"
},
{
"category": "external",
"summary": "SUSE Bug 1252909 for CVE-2025-40087",
"url": "https://bugzilla.suse.com/1252909"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40087"
},
{
"cve": "CVE-2025-40088",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40088"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhfsplus: fix slab-out-of-bounds read in hfsplus_strcasecmp()\n\nThe hfsplus_strcasecmp() logic can trigger the issue:\n\n[ 117.317703][ T9855] ==================================================================\n[ 117.318353][ T9855] BUG: KASAN: slab-out-of-bounds in hfsplus_strcasecmp+0x1bc/0x490\n[ 117.318991][ T9855] Read of size 2 at addr ffff88802160f40c by task repro/9855\n[ 117.319577][ T9855]\n[ 117.319773][ T9855] CPU: 0 UID: 0 PID: 9855 Comm: repro Not tainted 6.17.0-rc6 #33 PREEMPT(full)\n[ 117.319780][ T9855] Hardware name: QEMU Ubuntu 24.04 PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014\n[ 117.319783][ T9855] Call Trace:\n[ 117.319785][ T9855] \u003cTASK\u003e\n[ 117.319788][ T9855] dump_stack_lvl+0x1c1/0x2a0\n[ 117.319795][ T9855] ? __virt_addr_valid+0x1c8/0x5c0\n[ 117.319803][ T9855] ? __pfx_dump_stack_lvl+0x10/0x10\n[ 117.319808][ T9855] ? rcu_is_watching+0x15/0xb0\n[ 117.319816][ T9855] ? lock_release+0x4b/0x3e0\n[ 117.319821][ T9855] ? __kasan_check_byte+0x12/0x40\n[ 117.319828][ T9855] ? __virt_addr_valid+0x1c8/0x5c0\n[ 117.319835][ T9855] ? __virt_addr_valid+0x4a5/0x5c0\n[ 117.319842][ T9855] print_report+0x17e/0x7e0\n[ 117.319848][ T9855] ? __virt_addr_valid+0x1c8/0x5c0\n[ 117.319855][ T9855] ? __virt_addr_valid+0x4a5/0x5c0\n[ 117.319862][ T9855] ? __phys_addr+0xd3/0x180\n[ 117.319869][ T9855] ? hfsplus_strcasecmp+0x1bc/0x490\n[ 117.319876][ T9855] kasan_report+0x147/0x180\n[ 117.319882][ T9855] ? hfsplus_strcasecmp+0x1bc/0x490\n[ 117.319891][ T9855] hfsplus_strcasecmp+0x1bc/0x490\n[ 117.319900][ T9855] ? __pfx_hfsplus_cat_case_cmp_key+0x10/0x10\n[ 117.319906][ T9855] hfs_find_rec_by_key+0xa9/0x1e0\n[ 117.319913][ T9855] __hfsplus_brec_find+0x18e/0x470\n[ 117.319920][ T9855] ? __pfx_hfsplus_bnode_find+0x10/0x10\n[ 117.319926][ T9855] ? __pfx_hfs_find_rec_by_key+0x10/0x10\n[ 117.319933][ T9855] ? __pfx___hfsplus_brec_find+0x10/0x10\n[ 117.319942][ T9855] hfsplus_brec_find+0x28f/0x510\n[ 117.319949][ T9855] ? __pfx_hfs_find_rec_by_key+0x10/0x10\n[ 117.319956][ T9855] ? __pfx_hfsplus_brec_find+0x10/0x10\n[ 117.319963][ T9855] ? __kmalloc_noprof+0x2a9/0x510\n[ 117.319969][ T9855] ? hfsplus_find_init+0x8c/0x1d0\n[ 117.319976][ T9855] hfsplus_brec_read+0x2b/0x120\n[ 117.319983][ T9855] hfsplus_lookup+0x2aa/0x890\n[ 117.319990][ T9855] ? __pfx_hfsplus_lookup+0x10/0x10\n[ 117.320003][ T9855] ? d_alloc_parallel+0x2f0/0x15e0\n[ 117.320008][ T9855] ? __lock_acquire+0xaec/0xd80\n[ 117.320013][ T9855] ? __pfx_d_alloc_parallel+0x10/0x10\n[ 117.320019][ T9855] ? __raw_spin_lock_init+0x45/0x100\n[ 117.320026][ T9855] ? __init_waitqueue_head+0xa9/0x150\n[ 117.320034][ T9855] __lookup_slow+0x297/0x3d0\n[ 117.320039][ T9855] ? __pfx___lookup_slow+0x10/0x10\n[ 117.320045][ T9855] ? down_read+0x1ad/0x2e0\n[ 117.320055][ T9855] lookup_slow+0x53/0x70\n[ 117.320065][ T9855] walk_component+0x2f0/0x430\n[ 117.320073][ T9855] path_lookupat+0x169/0x440\n[ 117.320081][ T9855] filename_lookup+0x212/0x590\n[ 117.320089][ T9855] ? __pfx_filename_lookup+0x10/0x10\n[ 117.320098][ T9855] ? strncpy_from_user+0x150/0x290\n[ 117.320105][ T9855] ? getname_flags+0x1e5/0x540\n[ 117.320112][ T9855] user_path_at+0x3a/0x60\n[ 117.320117][ T9855] __x64_sys_umount+0xee/0x160\n[ 117.320123][ T9855] ? __pfx___x64_sys_umount+0x10/0x10\n[ 117.320129][ T9855] ? do_syscall_64+0xb7/0x3a0\n[ 117.320135][ T9855] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f\n[ 117.320141][ T9855] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f\n[ 117.320145][ T9855] do_syscall_64+0xf3/0x3a0\n[ 117.320150][ T9855] ? exc_page_fault+0x9f/0xf0\n[ 117.320154][ T9855] entry_SYSCALL_64_after_hwframe+0x77/0x7f\n[ 117.320158][ T9855] RIP: 0033:0x7f7dd7908b07\n[ 117.320163][ T9855] Code: 23 0d 00 f7 d8 64 89 01 48 83 c8 ff c3 66 0f 1f 44 00 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 08\n[ 117.320167][ T9855] RSP: 002b:00007ffd5ebd9698 EFLAGS: 00000202 \n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40088",
"url": "https://www.suse.com/security/cve/CVE-2025-40088"
},
{
"category": "external",
"summary": "SUSE Bug 1252904 for CVE-2025-40088",
"url": "https://bugzilla.suse.com/1252904"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40088"
},
{
"cve": "CVE-2025-40089",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40089"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncxl/features: Add check for no entries in cxl_feature_info\n\ncxl EDAC calls cxl_feature_info() to get the feature information and\nif the hardware has no Features support, cxlfs may be passed in as\nNULL.\n\n[ 51.957498] BUG: kernel NULL pointer dereference, address: 0000000000000008\n[ 51.965571] #PF: supervisor read access in kernel mode\n[ 51.971559] #PF: error_code(0x0000) - not-present page\n[ 51.977542] PGD 17e4f6067 P4D 0\n[ 51.981384] Oops: Oops: 0000 [#1] SMP NOPTI\n[ 51.986300] CPU: 49 UID: 0 PID: 3782 Comm: systemd-udevd Not tainted 6.17.0dj\ntest+ #64 PREEMPT(voluntary)\n[ 51.997355] Hardware name: \u003cremoved\u003e\n[ 52.009790] RIP: 0010:cxl_feature_info+0xa/0x80 [cxl_core]\n\nAdd a check for cxlfs before dereferencing it and return -EOPNOTSUPP if\nthere is no cxlfs created due to no hardware support.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40089",
"url": "https://www.suse.com/security/cve/CVE-2025-40089"
},
{
"category": "external",
"summary": "SUSE Bug 1252903 for CVE-2025-40089",
"url": "https://bugzilla.suse.com/1252903"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40089"
},
{
"cve": "CVE-2025-40090",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40090"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nksmbd: fix recursive locking in RPC handle list access\n\nSince commit 305853cce3794 (\"ksmbd: Fix race condition in RPC handle list\naccess\"), ksmbd_session_rpc_method() attempts to lock sess-\u003erpc_lock.\n\nThis causes hung connections / tasks when a client attempts to open\na named pipe. Using Samba\u0027s rpcclient tool:\n\n $ rpcclient //192.168.1.254 -U user%password\n $ rpcclient $\u003e srvinfo\n \u003cconnection hung here\u003e\n\nKernel side:\n \"echo 0 \u003e /proc/sys/kernel/hung_task_timeout_secs\" disables this message.\n task:kworker/0:0 state:D stack:0 pid:5021 tgid:5021 ppid:2 flags:0x00200000\n Workqueue: ksmbd-io handle_ksmbd_work\n Call trace:\n __schedule from schedule+0x3c/0x58\n schedule from schedule_preempt_disabled+0xc/0x10\n schedule_preempt_disabled from rwsem_down_read_slowpath+0x1b0/0x1d8\n rwsem_down_read_slowpath from down_read+0x28/0x30\n down_read from ksmbd_session_rpc_method+0x18/0x3c\n ksmbd_session_rpc_method from ksmbd_rpc_open+0x34/0x68\n ksmbd_rpc_open from ksmbd_session_rpc_open+0x194/0x228\n ksmbd_session_rpc_open from create_smb2_pipe+0x8c/0x2c8\n create_smb2_pipe from smb2_open+0x10c/0x27ac\n smb2_open from handle_ksmbd_work+0x238/0x3dc\n handle_ksmbd_work from process_scheduled_works+0x160/0x25c\n process_scheduled_works from worker_thread+0x16c/0x1e8\n worker_thread from kthread+0xa8/0xb8\n kthread from ret_from_fork+0x14/0x38\n Exception stack(0x8529ffb0 to 0x8529fff8)\n\nThe task deadlocks because the lock is already held:\n ksmbd_session_rpc_open\n down_write(\u0026sess-\u003erpc_lock)\n ksmbd_rpc_open\n ksmbd_session_rpc_method\n down_read(\u0026sess-\u003erpc_lock) \u003c-- deadlock\n\nAdjust ksmbd_session_rpc_method() callers to take the lock when necessary.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40090",
"url": "https://www.suse.com/security/cve/CVE-2025-40090"
},
{
"category": "external",
"summary": "SUSE Bug 1252910 for CVE-2025-40090",
"url": "https://bugzilla.suse.com/1252910"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40090"
},
{
"cve": "CVE-2025-40091",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40091"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nixgbe: fix too early devlink_free() in ixgbe_remove()\n\nSince ixgbe_adapter is embedded in devlink, calling devlink_free()\nprematurely in the ixgbe_remove() path can lead to UAF. Move devlink_free()\nto the end.\n\nKASAN report:\n\n BUG: KASAN: use-after-free in ixgbe_reset_interrupt_capability+0x140/0x180 [ixgbe]\n Read of size 8 at addr ffff0000adf813e0 by task bash/2095\n CPU: 1 UID: 0 PID: 2095 Comm: bash Tainted: G S 6.17.0-rc2-tnguy.net-queue+ #1 PREEMPT(full)\n [...]\n Call trace:\n show_stack+0x30/0x90 (C)\n dump_stack_lvl+0x9c/0xd0\n print_address_description.constprop.0+0x90/0x310\n print_report+0x104/0x1f0\n kasan_report+0x88/0x180\n __asan_report_load8_noabort+0x20/0x30\n ixgbe_reset_interrupt_capability+0x140/0x180 [ixgbe]\n ixgbe_clear_interrupt_scheme+0xf8/0x130 [ixgbe]\n ixgbe_remove+0x2d0/0x8c0 [ixgbe]\n pci_device_remove+0xa0/0x220\n device_remove+0xb8/0x170\n device_release_driver_internal+0x318/0x490\n device_driver_detach+0x40/0x68\n unbind_store+0xec/0x118\n drv_attr_store+0x64/0xb8\n sysfs_kf_write+0xcc/0x138\n kernfs_fop_write_iter+0x294/0x440\n new_sync_write+0x1fc/0x588\n vfs_write+0x480/0x6a0\n ksys_write+0xf0/0x1e0\n __arm64_sys_write+0x70/0xc0\n invoke_syscall.constprop.0+0xcc/0x280\n el0_svc_common.constprop.0+0xa8/0x248\n do_el0_svc+0x44/0x68\n el0_svc+0x54/0x160\n el0t_64_sync_handler+0xa0/0xe8\n el0t_64_sync+0x1b0/0x1b8",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40091",
"url": "https://www.suse.com/security/cve/CVE-2025-40091"
},
{
"category": "external",
"summary": "SUSE Bug 1252915 for CVE-2025-40091",
"url": "https://bugzilla.suse.com/1252915"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40091"
},
{
"cve": "CVE-2025-40092",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40092"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: gadget: f_ncm: Refactor bind path to use __free()\n\nAfter an bind/unbind cycle, the ncm-\u003enotify_req is left stale. If a\nsubsequent bind fails, the unified error label attempts to free this\nstale request, leading to a NULL pointer dereference when accessing\nep-\u003eops-\u003efree_request.\n\nRefactor the error handling in the bind path to use the __free()\nautomatic cleanup mechanism.\n\nUnable to handle kernel NULL pointer dereference at virtual address 0000000000000020\nCall trace:\n usb_ep_free_request+0x2c/0xec\n ncm_bind+0x39c/0x3dc\n usb_add_function+0xcc/0x1f0\n configfs_composite_bind+0x468/0x588\n gadget_bind_driver+0x104/0x270\n really_probe+0x190/0x374\n __driver_probe_device+0xa0/0x12c\n driver_probe_device+0x3c/0x218\n __device_attach_driver+0x14c/0x188\n bus_for_each_drv+0x10c/0x168\n __device_attach+0xfc/0x198\n device_initial_probe+0x14/0x24\n bus_probe_device+0x94/0x11c\n device_add+0x268/0x48c\n usb_add_gadget+0x198/0x28c\n dwc3_gadget_init+0x700/0x858\n __dwc3_set_mode+0x3cc/0x664\n process_scheduled_works+0x1d8/0x488\n worker_thread+0x244/0x334\n kthread+0x114/0x1bc\n ret_from_fork+0x10/0x20",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40092",
"url": "https://www.suse.com/security/cve/CVE-2025-40092"
},
{
"category": "external",
"summary": "SUSE Bug 1252916 for CVE-2025-40092",
"url": "https://bugzilla.suse.com/1252916"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40092"
},
{
"cve": "CVE-2025-40093",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40093"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: gadget: f_ecm: Refactor bind path to use __free()\n\nAfter an bind/unbind cycle, the ecm-\u003enotify_req is left stale. If a\nsubsequent bind fails, the unified error label attempts to free this\nstale request, leading to a NULL pointer dereference when accessing\nep-\u003eops-\u003efree_request.\n\nRefactor the error handling in the bind path to use the __free()\nautomatic cleanup mechanism.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40093",
"url": "https://www.suse.com/security/cve/CVE-2025-40093"
},
{
"category": "external",
"summary": "SUSE Bug 1252906 for CVE-2025-40093",
"url": "https://bugzilla.suse.com/1252906"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40093"
},
{
"cve": "CVE-2025-40094",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40094"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: gadget: f_acm: Refactor bind path to use __free()\n\nAfter an bind/unbind cycle, the acm-\u003enotify_req is left stale. If a\nsubsequent bind fails, the unified error label attempts to free this\nstale request, leading to a NULL pointer dereference when accessing\nep-\u003eops-\u003efree_request.\n\nRefactor the error handling in the bind path to use the __free()\nautomatic cleanup mechanism.\n\nUnable to handle kernel NULL pointer dereference at virtual address 0000000000000020\nCall trace:\n usb_ep_free_request+0x2c/0xec\n gs_free_req+0x30/0x44\n acm_bind+0x1b8/0x1f4\n usb_add_function+0xcc/0x1f0\n configfs_composite_bind+0x468/0x588\n gadget_bind_driver+0x104/0x270\n really_probe+0x190/0x374\n __driver_probe_device+0xa0/0x12c\n driver_probe_device+0x3c/0x218\n __device_attach_driver+0x14c/0x188\n bus_for_each_drv+0x10c/0x168\n __device_attach+0xfc/0x198\n device_initial_probe+0x14/0x24\n bus_probe_device+0x94/0x11c\n device_add+0x268/0x48c\n usb_add_gadget+0x198/0x28c\n dwc3_gadget_init+0x700/0x858\n __dwc3_set_mode+0x3cc/0x664\n process_scheduled_works+0x1d8/0x488\n worker_thread+0x244/0x334\n kthread+0x114/0x1bc\n ret_from_fork+0x10/0x20",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40094",
"url": "https://www.suse.com/security/cve/CVE-2025-40094"
},
{
"category": "external",
"summary": "SUSE Bug 1252899 for CVE-2025-40094",
"url": "https://bugzilla.suse.com/1252899"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40094"
},
{
"cve": "CVE-2025-40095",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40095"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: gadget: f_rndis: Refactor bind path to use __free()\n\nAfter an bind/unbind cycle, the rndis-\u003enotify_req is left stale. If a\nsubsequent bind fails, the unified error label attempts to free this\nstale request, leading to a NULL pointer dereference when accessing\nep-\u003eops-\u003efree_request.\n\nRefactor the error handling in the bind path to use the __free()\nautomatic cleanup mechanism.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40095",
"url": "https://www.suse.com/security/cve/CVE-2025-40095"
},
{
"category": "external",
"summary": "SUSE Bug 1252898 for CVE-2025-40095",
"url": "https://bugzilla.suse.com/1252898"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40095"
},
{
"cve": "CVE-2025-40096",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40096"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/sched: Fix potential double free in drm_sched_job_add_resv_dependencies\n\nWhen adding dependencies with drm_sched_job_add_dependency(), that\nfunction consumes the fence reference both on success and failure, so in\nthe latter case the dma_fence_put() on the error path (xarray failed to\nexpand) is a double free.\n\nInterestingly this bug appears to have been present ever since\ncommit ebd5f74255b9 (\"drm/sched: Add dependency tracking\"), since the code\nback then looked like this:\n\ndrm_sched_job_add_implicit_dependencies():\n...\n for (i = 0; i \u003c fence_count; i++) {\n ret = drm_sched_job_add_dependency(job, fences[i]);\n if (ret)\n break;\n }\n\n for (; i \u003c fence_count; i++)\n dma_fence_put(fences[i]);\n\nWhich means for the failing \u0027i\u0027 the dma_fence_put was already a double\nfree. Possibly there were no users at that time, or the test cases were\ninsufficient to hit it.\n\nThe bug was then only noticed and fixed after\ncommit 9c2ba265352a (\"drm/scheduler: use new iterator in drm_sched_job_add_implicit_dependencies v2\")\nlanded, with its fixup of\ncommit 4eaf02d6076c (\"drm/scheduler: fix drm_sched_job_add_implicit_dependencies\").\n\nAt that point it was a slightly different flavour of a double free, which\ncommit 963d0b356935 (\"drm/scheduler: fix drm_sched_job_add_implicit_dependencies harder\")\nnoticed and attempted to fix.\n\nBut it only moved the double free from happening inside the\ndrm_sched_job_add_dependency(), when releasing the reference not yet\nobtained, to the caller, when releasing the reference already released by\nthe former in the failure case.\n\nAs such it is not easy to identify the right target for the fixes tag so\nlets keep it simple and just continue the chain.\n\nWhile fixing we also improve the comment and explain the reason for taking\nthe reference and not dropping it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40096",
"url": "https://www.suse.com/security/cve/CVE-2025-40096"
},
{
"category": "external",
"summary": "SUSE Bug 1252902 for CVE-2025-40096",
"url": "https://bugzilla.suse.com/1252902"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40096"
},
{
"cve": "CVE-2025-40097",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40097"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: hda: Fix missing pointer check in hda_component_manager_init function\n\nThe __component_match_add function may assign the \u0027matchptr\u0027 pointer\nthe value ERR_PTR(-ENOMEM), which will subsequently be dereferenced.\n\nThe call stack leading to the error looks like this:\n\nhda_component_manager_init\n|-\u003e component_match_add\n |-\u003e component_match_add_release\n |-\u003e __component_match_add ( ... ,**matchptr, ... )\n |-\u003e *matchptr = ERR_PTR(-ENOMEM); // assign\n|-\u003e component_master_add_with_match( ... match)\n |-\u003e component_match_realloc(match, match-\u003enum); // dereference\n\nAdd IS_ERR() check to prevent the crash.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40097",
"url": "https://www.suse.com/security/cve/CVE-2025-40097"
},
{
"category": "external",
"summary": "SUSE Bug 1252900 for CVE-2025-40097",
"url": "https://bugzilla.suse.com/1252900"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40097"
},
{
"cve": "CVE-2025-40098",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40098"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_get_acpi_mute_state()\n\nReturn value of a function acpi_evaluate_dsm() is dereferenced without\nchecking for NULL, but it is usually checked for this function.\n\nacpi_evaluate_dsm() may return NULL, when acpi_evaluate_object() returns\nacpi_status other than ACPI_SUCCESS, so add a check to prevent the crach.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40098",
"url": "https://www.suse.com/security/cve/CVE-2025-40098"
},
{
"category": "external",
"summary": "SUSE Bug 1252917 for CVE-2025-40098",
"url": "https://bugzilla.suse.com/1252917"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40098"
},
{
"cve": "CVE-2025-40099",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40099"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncifs: parse_dfs_referrals: prevent oob on malformed input\n\nMalicious SMB server can send invalid reply to FSCTL_DFS_GET_REFERRALS\n\n- reply smaller than sizeof(struct get_dfs_referral_rsp)\n- reply with number of referrals smaller than NumberOfReferrals in the\nheader\n\nProcessing of such replies will cause oob.\n\nReturn -EINVAL error on such replies to prevent oob-s.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40099",
"url": "https://www.suse.com/security/cve/CVE-2025-40099"
},
{
"category": "external",
"summary": "SUSE Bug 1252911 for CVE-2025-40099",
"url": "https://bugzilla.suse.com/1252911"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40099"
},
{
"cve": "CVE-2025-40100",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40100"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: do not assert we found block group item when creating free space tree\n\nCurrently, when building a free space tree at populate_free_space_tree(),\nif we are not using the block group tree feature, we always expect to find\nblock group items (either extent items or a block group item with key type\nBTRFS_BLOCK_GROUP_ITEM_KEY) when we search the extent tree with\nbtrfs_search_slot_for_read(), so we assert that we found an item. However\nthis expectation is wrong since we can have a new block group created in\nthe current transaction which is still empty and for which we still have\nnot added the block group\u0027s item to the extent tree, in which case we do\nnot have any items in the extent tree associated to the block group.\n\nThe insertion of a new block group\u0027s block group item in the extent tree\nhappens at btrfs_create_pending_block_groups() when it calls the helper\ninsert_block_group_item(). This typically is done when a transaction\nhandle is released, committed or when running delayed refs (either as\npart of a transaction commit or when serving tickets for space reservation\nif we are low on free space).\n\nSo remove the assertion at populate_free_space_tree() even when the block\ngroup tree feature is not enabled and update the comment to mention this\ncase.\n\nSyzbot reported this with the following stack trace:\n\n BTRFS info (device loop3 state M): rebuilding free space tree\n assertion failed: ret == 0 :: 0, in fs/btrfs/free-space-tree.c:1115\n ------------[ cut here ]------------\n kernel BUG at fs/btrfs/free-space-tree.c:1115!\n Oops: invalid opcode: 0000 [#1] SMP KASAN PTI\n CPU: 1 UID: 0 PID: 6352 Comm: syz.3.25 Not tainted syzkaller #0 PREEMPT(full)\n Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025\n RIP: 0010:populate_free_space_tree+0x700/0x710 fs/btrfs/free-space-tree.c:1115\n Code: ff ff e8 d3 (...)\n RSP: 0018:ffffc9000430f780 EFLAGS: 00010246\n RAX: 0000000000000043 RBX: ffff88805b709630 RCX: fea61d0e2e79d000\n RDX: 0000000000000000 RSI: 0000000080000000 RDI: 0000000000000000\n RBP: ffffc9000430f8b0 R08: ffffc9000430f4a7 R09: 1ffff92000861e94\n R10: dffffc0000000000 R11: fffff52000861e95 R12: 0000000000000001\n R13: 1ffff92000861f00 R14: dffffc0000000000 R15: 0000000000000000\n FS: 00007f424d9fe6c0(0000) GS:ffff888125afc000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 00007fd78ad212c0 CR3: 0000000076d68000 CR4: 00000000003526f0\n Call Trace:\n \u003cTASK\u003e\n btrfs_rebuild_free_space_tree+0x1ba/0x6d0 fs/btrfs/free-space-tree.c:1364\n btrfs_start_pre_rw_mount+0x128f/0x1bf0 fs/btrfs/disk-io.c:3062\n btrfs_remount_rw fs/btrfs/super.c:1334 [inline]\n btrfs_reconfigure+0xaed/0x2160 fs/btrfs/super.c:1559\n reconfigure_super+0x227/0x890 fs/super.c:1076\n do_remount fs/namespace.c:3279 [inline]\n path_mount+0xd1a/0xfe0 fs/namespace.c:4027\n do_mount fs/namespace.c:4048 [inline]\n __do_sys_mount fs/namespace.c:4236 [inline]\n __se_sys_mount+0x313/0x410 fs/namespace.c:4213\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xfa/0xfa0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n RIP: 0033:0x7f424e39066a\n Code: d8 64 89 02 (...)\n RSP: 002b:00007f424d9fde68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5\n RAX: ffffffffffffffda RBX: 00007f424d9fdef0 RCX: 00007f424e39066a\n RDX: 0000200000000180 RSI: 0000200000000380 RDI: 0000000000000000\n RBP: 0000200000000180 R08: 00007f424d9fdef0 R09: 0000000000000020\n R10: 0000000000000020 R11: 0000000000000246 R12: 0000200000000380\n R13: 00007f424d9fdeb0 R14: 0000000000000000 R15: 00002000000002c0\n \u003c/TASK\u003e\n Modules linked in:\n ---[ end trace 0000000000000000 ]---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40100",
"url": "https://www.suse.com/security/cve/CVE-2025-40100"
},
{
"category": "external",
"summary": "SUSE Bug 1252918 for CVE-2025-40100",
"url": "https://bugzilla.suse.com/1252918"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40100"
},
{
"cve": "CVE-2025-40101",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40101"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix memory leaks when rejecting a non SINGLE data profile without an RST\n\nAt the end of btrfs_load_block_group_zone_info() the first thing we do\nis to ensure that if the mapping type is not a SINGLE one and there is\nno RAID stripe tree, then we return early with an error.\n\nDoing that, though, prevents the code from running the last calls from\nthis function which are about freeing memory allocated during its\nrun. Hence, in this case, instead of returning early, we set the ret\nvalue and fall through the rest of the cleanup code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40101",
"url": "https://www.suse.com/security/cve/CVE-2025-40101"
},
{
"category": "external",
"summary": "SUSE Bug 1252901 for CVE-2025-40101",
"url": "https://bugzilla.suse.com/1252901"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-04T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2025-40101"
},
{
"cve": "CVE-2025-40102",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40102"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: arm64: Prevent access to vCPU events before init\n\nAnother day, another syzkaller bug. KVM erroneously allows userspace to\npend vCPU events for a vCPU that hasn\u0027t been initialized yet, leading to\nKVM interpreting a bunch of uninitialized garbage for routing /\ninjecting the exception.\n\nIn one case the injection code and the hyp disagree on whether the vCPU\nhas a 32bit EL1 and put the vCPU into an illegal mode for AArch64,\ntripping the BUG() in exception_target_el() during the next injection:\n\n kernel BUG at arch/arm64/kvm/inject_fault.c:40!\n Internal error: Oops - BUG: 00000000f2000800 [#1] SMP\n CPU: 3 UID: 0 PID: 318 Comm: repro Not tainted 6.17.0-rc4-00104-g10fd0285305d #6 PREEMPT\n Hardware name: linux,dummy-virt (DT)\n pstate: 21402009 (nzCv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--)\n pc : exception_target_el+0x88/0x8c\n lr : pend_serror_exception+0x18/0x13c\n sp : ffff800082f03a10\n x29: ffff800082f03a10 x28: ffff0000cb132280 x27: 0000000000000000\n x26: 0000000000000000 x25: ffff0000c2a99c20 x24: 0000000000000000\n x23: 0000000000008000 x22: 0000000000000002 x21: 0000000000000004\n x20: 0000000000008000 x19: ffff0000c2a99c20 x18: 0000000000000000\n x17: 0000000000000000 x16: 0000000000000000 x15: 00000000200000c0\n x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000\n x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000\n x8 : ffff800082f03af8 x7 : 0000000000000000 x6 : 0000000000000000\n x5 : ffff800080f621f0 x4 : 0000000000000000 x3 : 0000000000000000\n x2 : 000000000040009b x1 : 0000000000000003 x0 : ffff0000c2a99c20\n Call trace:\n exception_target_el+0x88/0x8c (P)\n kvm_inject_serror_esr+0x40/0x3b4\n __kvm_arm_vcpu_set_events+0xf0/0x100\n kvm_arch_vcpu_ioctl+0x180/0x9d4\n kvm_vcpu_ioctl+0x60c/0x9f4\n __arm64_sys_ioctl+0xac/0x104\n invoke_syscall+0x48/0x110\n el0_svc_common.constprop.0+0x40/0xe0\n do_el0_svc+0x1c/0x28\n el0_svc+0x34/0xf0\n el0t_64_sync_handler+0xa0/0xe4\n el0t_64_sync+0x198/0x19c\n Code: f946bc01 b4fffe61 9101e020 17fffff2 (d4210000)\n\nReject the ioctls outright as no sane VMM would call these before\nKVM_ARM_VCPU_INIT anyway. Even if it did the exception would\u0027ve been\nthrown away by the eventual reset of the vCPU\u0027s state.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40102",
"url": "https://www.suse.com/security/cve/CVE-2025-40102"
},
{
"category": "external",
"summary": "SUSE Bug 1252919 for CVE-2025-40102",
"url": "https://bugzilla.suse.com/1252919"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40102"
},
{
"cve": "CVE-2025-40103",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40103"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: Fix refcount leak for cifs_sb_tlink\n\nFix three refcount inconsistency issues related to `cifs_sb_tlink`.\n\nComments for `cifs_sb_tlink` state that `cifs_put_tlink()` needs to be\ncalled after successful calls to `cifs_sb_tlink()`. Three calls fail to\nupdate refcount accordingly, leading to possible resource leaks.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40103",
"url": "https://www.suse.com/security/cve/CVE-2025-40103"
},
{
"category": "external",
"summary": "SUSE Bug 1252924 for CVE-2025-40103",
"url": "https://bugzilla.suse.com/1252924"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-04T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2025-40103"
},
{
"cve": "CVE-2025-40104",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40104"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nixgbevf: fix mailbox API compatibility by negotiating supported features\n\nThere was backward compatibility in the terms of mailbox API. Various\ndrivers from various OSes supporting 10G adapters from Intel portfolio\ncould easily negotiate mailbox API.\n\nThis convention has been broken since introducing API 1.4.\nCommit 0062e7cc955e (\"ixgbevf: add VF IPsec offload code\") added support\nfor IPSec which is specific only for the kernel ixgbe driver. None of the\nrest of the Intel 10G PF/VF drivers supports it. And actually lack of\nsupport was not included in the IPSec implementation - there were no such\ncode paths. No possibility to negotiate support for the feature was\nintroduced along with introduction of the feature itself.\n\nCommit 339f28964147 (\"ixgbevf: Add support for new mailbox communication\nbetween PF and VF\") increasing API version to 1.5 did the same - it\nintroduced code supported specifically by the PF ESX driver. It altered API\nversion for the VF driver in the same time not touching the version\ndefined for the PF ixgbe driver. It led to additional discrepancies,\nas the code provided within API 1.6 cannot be supported for Linux ixgbe\ndriver as it causes crashes.\n\nThe issue was noticed some time ago and mitigated by Jake within the commit\nd0725312adf5 (\"ixgbevf: stop attempting IPSEC offload on Mailbox API 1.5\").\nAs a result we have regression for IPsec support and after increasing API\nto version 1.6 ixgbevf driver stopped to support ESX MBX.\n\nTo fix this mess add new mailbox op asking PF driver about supported\nfeatures. Basing on a response determine whether to set support for IPSec\nand ESX-specific enhanced mailbox.\n\nNew mailbox op, for compatibility purposes, must be added within new API\nrevision, as API version of OOT PF \u0026 VF drivers is already increased to\n1.6 and doesn\u0027t incorporate features negotiate op.\n\nFeatures negotiation mechanism gives possibility to be extended with new\nfeatures when needed in the future.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40104",
"url": "https://www.suse.com/security/cve/CVE-2025-40104"
},
{
"category": "external",
"summary": "SUSE Bug 1252921 for CVE-2025-40104",
"url": "https://bugzilla.suse.com/1252921"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40104"
},
{
"cve": "CVE-2025-40105",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40105"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvfs: Don\u0027t leak disconnected dentries on umount\n\nWhen user calls open_by_handle_at() on some inode that is not cached, we\nwill create disconnected dentry for it. If such dentry is a directory,\nexportfs_decode_fh_raw() will then try to connect this dentry to the\ndentry tree through reconnect_path(). It may happen for various reasons\n(such as corrupted fs or race with rename) that the call to\nlookup_one_unlocked() in reconnect_one() will fail to find the dentry we\nare trying to reconnect and instead create a new dentry under the\nparent. Now this dentry will not be marked as disconnected although the\nparent still may well be disconnected (at least in case this\ninconsistency happened because the fs is corrupted and .. doesn\u0027t point\nto the real parent directory). This creates inconsistency in\ndisconnected flags but AFAICS it was mostly harmless. At least until\ncommit f1ee616214cb (\"VFS: don\u0027t keep disconnected dentries on d_anon\")\nwhich removed adding of most disconnected dentries to sb-\u003es_anon list.\nThus after this commit cleanup of disconnected dentries implicitely\nrelies on the fact that dput() will immediately reclaim such dentries.\nHowever when some leaf dentry isn\u0027t marked as disconnected, as in the\nscenario described above, the reclaim doesn\u0027t happen and the dentries\nare \"leaked\". Memory reclaim can eventually reclaim them but otherwise\nthey stay in memory and if umount comes first, we hit infamous \"Busy\ninodes after unmount\" bug. Make sure all dentries created under a\ndisconnected parent are marked as disconnected as well.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40105",
"url": "https://www.suse.com/security/cve/CVE-2025-40105"
},
{
"category": "external",
"summary": "SUSE Bug 1252928 for CVE-2025-40105",
"url": "https://bugzilla.suse.com/1252928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-04T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2025-40105"
},
{
"cve": "CVE-2025-40106",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40106"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncomedi: fix divide-by-zero in comedi_buf_munge()\n\nThe comedi_buf_munge() function performs a modulo operation\n`async-\u003emunge_chan %= async-\u003ecmd.chanlist_len` without first\nchecking if chanlist_len is zero. If a user program submits a command with\nchanlist_len set to zero, this causes a divide-by-zero error when the device\nprocesses data in the interrupt handler path.\n\nAdd a check for zero chanlist_len at the beginning of the\nfunction, similar to the existing checks for !map and\nCMDF_RAWDATA flag. When chanlist_len is zero, update\nmunge_count and return early, indicating the data was\nhandled without munging.\n\nThis prevents potential kernel panics from malformed user commands.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40106",
"url": "https://www.suse.com/security/cve/CVE-2025-40106"
},
{
"category": "external",
"summary": "SUSE Bug 1252891 for CVE-2025-40106",
"url": "https://bugzilla.suse.com/1252891"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.17.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.17.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40106"
}
]
}
OPENSUSE-SU-2026:10301-1
Vulnerability from csaf_opensuse - Published: 2026-03-07 00:00 - Updated: 2026-03-07 00:00| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "kernel-devel-longterm-6.18.16-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the kernel-devel-longterm-6.18.16-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2026-10301",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2026_10301-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-28956 page",
"url": "https://www.suse.com/security/cve/CVE-2024-28956/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39991 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39991/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39992 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39992/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39993 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39993/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39994 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39994/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39995 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39995/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39996 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39996/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39997 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39997/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39998 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39998/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39999 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39999/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40000 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40000/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40001 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40001/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40002 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40002/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40003 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40003/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40004 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40004/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40013 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40013/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40015 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40015/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40016 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40016/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40017 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40017/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40018 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40018/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40019 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40019/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40025 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40025/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40026 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40026/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40027 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40027/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40028 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40028/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40029 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40029/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40030 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40030/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40031 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40031/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40032 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40032/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40033 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40033/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40034 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40034/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40035 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40035/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40036 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40036/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40037 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40037/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40038 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40038/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40039 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40039/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40040 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40040/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40041 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40041/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40042 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40042/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40043 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40043/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40044 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40044/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40045 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40045/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40046 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40046/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40047 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40047/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40048 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40048/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40049 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40049/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40050 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40050/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40051 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40051/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40052 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40052/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40053 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40053/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40054 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40054/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40055 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40055/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40056 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40056/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40057 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40057/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40058 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40058/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40059 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40059/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40060 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40060/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40061 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40061/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40062 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40062/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40063 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40063/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40064 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40064/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40065 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40065/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40066 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40066/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40067 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40067/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40068 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40068/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40069 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40069/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40070 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40070/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40071 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40071/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40072 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40072/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40073 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40073/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40074 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40074/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40075 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40075/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40076 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40076/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40077 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40077/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40078 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40078/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40079 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40079/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40080 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40080/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40081 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40081/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40082 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40082/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40084 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40084/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40085 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40085/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40086 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40086/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40087 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40087/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40088 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40088/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40089 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40089/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40090 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40090/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40091 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40091/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40092 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40092/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40093 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40093/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40094 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40094/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40095 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40095/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40096 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40096/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40097 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40097/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40098 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40098/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40099 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40099/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40100 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40100/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40101 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40101/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40102 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40102/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40103 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40103/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40104 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40104/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40105 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40105/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40106 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40106/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40300 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40300/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68254 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68254/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68255 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68255/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68256 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68256/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68257 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68257/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68258 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68258/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68259 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68259/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68260 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68260/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68261 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68261/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68262 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68262/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68263 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68263/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68264 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68264/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68323 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68323/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68324 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68324/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68325 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68325/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68332 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68332/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68335 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68335/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68336 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68336/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68337 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68337/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68344 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68344/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68345 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68345/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68346 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68346/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68347 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68347/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68348 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68348/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68349 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68349/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68350 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68350/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68351 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68351/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68352 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68352/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68353 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68353/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68354 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68354/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68355 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68355/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68356 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68356/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68357 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68357/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68358 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68358/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68359 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68359/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68360 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68360/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68361 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68361/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68362 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68362/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68363 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68363/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68364 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68364/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68365 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68365/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68366 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68366/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68367 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68367/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68368 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68368/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68369 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68369/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68370 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68370/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68371 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68371/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68372 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68372/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68373 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68373/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68374 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68374/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68375 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68375/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68376 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68376/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68377 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68377/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68378 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68378/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68379 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68379/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68380 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68380/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68724 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68724/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68725 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68725/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68726 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68726/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68727 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68727/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68728 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68728/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68729 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68729/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68730 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68730/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68731 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68731/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68732 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68732/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68733 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68733/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68735 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68735/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68736 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68736/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68737 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68737/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68738 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68738/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68739 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68739/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68740 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68740/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68741 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68741/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68742 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68742/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68743 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68743/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68744 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68744/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68745 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68745/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68746 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68746/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68747 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68747/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68748 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68748/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68749 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68749/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68751 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68751/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68752 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68752/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68753 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68753/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68754 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68754/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68755 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68755/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68756 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68756/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68757 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68757/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68758 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68758/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68759 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68759/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68760 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68760/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68761 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68761/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68762 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68762/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68763 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68763/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68764 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68764/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68765 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68765/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68766 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68766/"
}
],
"title": "kernel-devel-longterm-6.18.16-1.1 on GA media",
"tracking": {
"current_release_date": "2026-03-07T00:00:00Z",
"generator": {
"date": "2026-03-07T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2026:10301-1",
"initial_release_date": "2026-03-07T00:00:00Z",
"revision_history": [
{
"date": "2026-03-07T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-longterm-6.18.16-1.1.aarch64",
"product": {
"name": "kernel-devel-longterm-6.18.16-1.1.aarch64",
"product_id": "kernel-devel-longterm-6.18.16-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-source-longterm-6.18.16-1.1.aarch64",
"product": {
"name": "kernel-source-longterm-6.18.16-1.1.aarch64",
"product_id": "kernel-source-longterm-6.18.16-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-longterm-6.18.16-1.1.ppc64le",
"product": {
"name": "kernel-devel-longterm-6.18.16-1.1.ppc64le",
"product_id": "kernel-devel-longterm-6.18.16-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-source-longterm-6.18.16-1.1.ppc64le",
"product": {
"name": "kernel-source-longterm-6.18.16-1.1.ppc64le",
"product_id": "kernel-source-longterm-6.18.16-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-longterm-6.18.16-1.1.s390x",
"product": {
"name": "kernel-devel-longterm-6.18.16-1.1.s390x",
"product_id": "kernel-devel-longterm-6.18.16-1.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-source-longterm-6.18.16-1.1.s390x",
"product": {
"name": "kernel-source-longterm-6.18.16-1.1.s390x",
"product_id": "kernel-source-longterm-6.18.16-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-longterm-6.18.16-1.1.x86_64",
"product": {
"name": "kernel-devel-longterm-6.18.16-1.1.x86_64",
"product_id": "kernel-devel-longterm-6.18.16-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-source-longterm-6.18.16-1.1.x86_64",
"product": {
"name": "kernel-source-longterm-6.18.16-1.1.x86_64",
"product_id": "kernel-source-longterm-6.18.16-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-longterm-6.18.16-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64"
},
"product_reference": "kernel-devel-longterm-6.18.16-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-longterm-6.18.16-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le"
},
"product_reference": "kernel-devel-longterm-6.18.16-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-longterm-6.18.16-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x"
},
"product_reference": "kernel-devel-longterm-6.18.16-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-longterm-6.18.16-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64"
},
"product_reference": "kernel-devel-longterm-6.18.16-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-longterm-6.18.16-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64"
},
"product_reference": "kernel-source-longterm-6.18.16-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-longterm-6.18.16-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le"
},
"product_reference": "kernel-source-longterm-6.18.16-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-longterm-6.18.16-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x"
},
"product_reference": "kernel-source-longterm-6.18.16-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-longterm-6.18.16-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
},
"product_reference": "kernel-source-longterm-6.18.16-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-28956",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-28956"
}
],
"notes": [
{
"category": "general",
"text": "Exposure of Sensitive Information in Shared Microarchitectural Structures during Transient Execution for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-28956",
"url": "https://www.suse.com/security/cve/CVE-2024-28956"
},
{
"category": "external",
"summary": "SUSE Bug 1242006 for CVE-2024-28956",
"url": "https://bugzilla.suse.com/1242006"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2024-28956"
},
{
"cve": "CVE-2025-39991",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39991"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath11k: fix NULL dereference in ath11k_qmi_m3_load()\n\nIf ab-\u003efw.m3_data points to data, then fw pointer remains null.\nFurther, if m3_mem is not allocated, then fw is dereferenced to be\npassed to ath11k_err function.\n\nReplace fw-\u003esize by m3_len.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39991",
"url": "https://www.suse.com/security/cve/CVE-2025-39991"
},
{
"category": "external",
"summary": "SUSE Bug 1252075 for CVE-2025-39991",
"url": "https://bugzilla.suse.com/1252075"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-39991"
},
{
"cve": "CVE-2025-39992",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39992"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm: swap: check for stable address space before operating on the VMA\n\nIt is possible to hit a zero entry while traversing the vmas in unuse_mm()\ncalled from swapoff path and accessing it causes the OOPS:\n\nUnable to handle kernel NULL pointer dereference at virtual address\n0000000000000446--\u003e Loading the memory from offset 0x40 on the\nXA_ZERO_ENTRY as address.\nMem abort info:\n ESR = 0x0000000096000005\n EC = 0x25: DABT (current EL), IL = 32 bits\n SET = 0, FnV = 0\n EA = 0, S1PTW = 0\n FSC = 0x05: level 1 translation fault\n\nThe issue is manifested from the below race between the fork() on a\nprocess and swapoff:\nfork(dup_mmap())\t\t\tswapoff(unuse_mm)\n--------------- -----------------\n1) Identical mtree is built using\n __mt_dup().\n\n2) copy_pte_range()--\u003e\n\tcopy_nonpresent_pte():\n The dst mm is added into the\n mmlist to be visible to the\n swapoff operation.\n\n3) Fatal signal is sent to the parent\nprocess(which is the current during the\nfork) thus skip the duplication of the\nvmas and mark the vma range with\nXA_ZERO_ENTRY as a marker for this process\nthat helps during exit_mmap().\n\n\t\t\t\t 4) swapoff is tried on the\n\t\t\t\t\t\u0027mm\u0027 added to the \u0027mmlist\u0027 as\n\t\t\t\t\tpart of the 2.\n\n\t\t\t\t 5) unuse_mm(), that iterates\n\t\t\t\t\tthrough the vma\u0027s of this \u0027mm\u0027\n\t\t\t\t\twill hit the non-NULL zero entry\n\t\t\t\t\tand operating on this zero entry\n\t\t\t\t\tas a vma is resulting into the\n\t\t\t\t\toops.\n\nThe proper fix would be around not exposing this partially-valid tree to\nothers when droping the mmap lock, which is being solved with [1]. A\nsimpler solution would be checking for MMF_UNSTABLE, as it is set if\nmm_struct is not fully initialized in dup_mmap().\n\nThanks to Liam/Lorenzo/David for all the suggestions in fixing this\nissue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39992",
"url": "https://www.suse.com/security/cve/CVE-2025-39992"
},
{
"category": "external",
"summary": "SUSE Bug 1252076 for CVE-2025-39992",
"url": "https://bugzilla.suse.com/1252076"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-39992"
},
{
"cve": "CVE-2025-39993",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39993"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: rc: fix races with imon_disconnect()\n\nSyzbot reports a KASAN issue as below:\nBUG: KASAN: use-after-free in __create_pipe include/linux/usb.h:1945 [inline]\nBUG: KASAN: use-after-free in send_packet+0xa2d/0xbc0 drivers/media/rc/imon.c:627\nRead of size 4 at addr ffff8880256fb000 by task syz-executor314/4465\n\nCPU: 2 PID: 4465 Comm: syz-executor314 Not tainted 6.0.0-rc1-syzkaller #0\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014\nCall Trace:\n \u003cTASK\u003e\n__dump_stack lib/dump_stack.c:88 [inline]\ndump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106\nprint_address_description mm/kasan/report.c:317 [inline]\nprint_report.cold+0x2ba/0x6e9 mm/kasan/report.c:433\nkasan_report+0xb1/0x1e0 mm/kasan/report.c:495\n__create_pipe include/linux/usb.h:1945 [inline]\nsend_packet+0xa2d/0xbc0 drivers/media/rc/imon.c:627\nvfd_write+0x2d9/0x550 drivers/media/rc/imon.c:991\nvfs_write+0x2d7/0xdd0 fs/read_write.c:576\nksys_write+0x127/0x250 fs/read_write.c:631\ndo_syscall_x64 arch/x86/entry/common.c:50 [inline]\ndo_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80\nentry_SYSCALL_64_after_hwframe+0x63/0xcd\n\nThe iMON driver improperly releases the usb_device reference in\nimon_disconnect without coordinating with active users of the\ndevice.\n\nSpecifically, the fields usbdev_intf0 and usbdev_intf1 are not\nprotected by the users counter (ictx-\u003eusers). During probe,\nimon_init_intf0 or imon_init_intf1 increments the usb_device\nreference count depending on the interface. However, during\ndisconnect, usb_put_dev is called unconditionally, regardless of\nactual usage.\n\nAs a result, if vfd_write or other operations are still in\nprogress after disconnect, this can lead to a use-after-free of\nthe usb_device pointer.\n\nThread 1 vfd_write Thread 2 imon_disconnect\n ...\n if\n usb_put_dev(ictx-\u003eusbdev_intf0)\n else\n usb_put_dev(ictx-\u003eusbdev_intf1)\n...\nwhile\n send_packet\n if\n pipe = usb_sndintpipe(\n ictx-\u003eusbdev_intf0) UAF\n else\n pipe = usb_sndctrlpipe(\n ictx-\u003eusbdev_intf0, 0) UAF\n\nGuard access to usbdev_intf0 and usbdev_intf1 after disconnect by\nchecking ictx-\u003edisconnected in all writer paths. Add early return\nwith -ENODEV in send_packet(), vfd_write(), lcd_write() and\ndisplay_open() if the device is no longer present.\n\nSet and read ictx-\u003edisconnected under ictx-\u003elock to ensure memory\nsynchronization. Acquire the lock in imon_disconnect() before setting\nthe flag to synchronize with any ongoing operations.\n\nEnsure writers exit early and safely after disconnect before the USB\ncore proceeds with cleanup.\n\nFound by Linux Verification Center (linuxtesting.org) with Syzkaller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39993",
"url": "https://www.suse.com/security/cve/CVE-2025-39993"
},
{
"category": "external",
"summary": "SUSE Bug 1252070 for CVE-2025-39993",
"url": "https://bugzilla.suse.com/1252070"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-39993"
},
{
"cve": "CVE-2025-39994",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39994"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: tuner: xc5000: Fix use-after-free in xc5000_release\n\nThe original code uses cancel_delayed_work() in xc5000_release(), which\ndoes not guarantee that the delayed work item timer_sleep has fully\ncompleted if it was already running. This leads to use-after-free scenarios\nwhere xc5000_release() may free the xc5000_priv while timer_sleep is still\nactive and attempts to dereference the xc5000_priv.\n\nA typical race condition is illustrated below:\n\nCPU 0 (release thread) | CPU 1 (delayed work callback)\nxc5000_release() | xc5000_do_timer_sleep()\n cancel_delayed_work() |\n hybrid_tuner_release_state(priv) |\n kfree(priv) |\n | priv = container_of() // UAF\n\nReplace cancel_delayed_work() with cancel_delayed_work_sync() to ensure\nthat the timer_sleep is properly canceled before the xc5000_priv memory\nis deallocated.\n\nA deadlock concern was considered: xc5000_release() is called in a process\ncontext and is not holding any locks that the timer_sleep work item might\nalso need. Therefore, the use of the _sync() variant is safe here.\n\nThis bug was initially identified through static analysis.\n\n[hverkuil: fix typo in Subject: tunner -\u003e tuner]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39994",
"url": "https://www.suse.com/security/cve/CVE-2025-39994"
},
{
"category": "external",
"summary": "SUSE Bug 1252072 for CVE-2025-39994",
"url": "https://bugzilla.suse.com/1252072"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-39994"
},
{
"cve": "CVE-2025-39995",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39995"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: i2c: tc358743: Fix use-after-free bugs caused by orphan timer in probe\n\nThe state-\u003etimer is a cyclic timer that schedules work_i2c_poll and\ndelayed_work_enable_hotplug, while rearming itself. Using timer_delete()\nfails to guarantee the timer isn\u0027t still running when destroyed, similarly\ncancel_delayed_work() cannot ensure delayed_work_enable_hotplug has\nterminated if already executing. During probe failure after timer\ninitialization, these may continue running as orphans and reference the\nalready-freed tc358743_state object through tc358743_irq_poll_timer.\n\nThe following is the trace captured by KASAN.\n\nBUG: KASAN: slab-use-after-free in __run_timer_base.part.0+0x7d7/0x8c0\nWrite of size 8 at addr ffff88800ded83c8 by task swapper/1/0\n...\nCall Trace:\n \u003cIRQ\u003e\n dump_stack_lvl+0x55/0x70\n print_report+0xcf/0x610\n ? __pfx_sched_balance_find_src_group+0x10/0x10\n ? __run_timer_base.part.0+0x7d7/0x8c0\n kasan_report+0xb8/0xf0\n ? __run_timer_base.part.0+0x7d7/0x8c0\n __run_timer_base.part.0+0x7d7/0x8c0\n ? rcu_sched_clock_irq+0xb06/0x27d0\n ? __pfx___run_timer_base.part.0+0x10/0x10\n ? try_to_wake_up+0xb15/0x1960\n ? tmigr_update_events+0x280/0x740\n ? _raw_spin_lock_irq+0x80/0xe0\n ? __pfx__raw_spin_lock_irq+0x10/0x10\n tmigr_handle_remote_up+0x603/0x7e0\n ? __pfx_tmigr_handle_remote_up+0x10/0x10\n ? sched_balance_trigger+0x98/0x9f0\n ? sched_tick+0x221/0x5a0\n ? _raw_spin_lock_irq+0x80/0xe0\n ? __pfx__raw_spin_lock_irq+0x10/0x10\n ? tick_nohz_handler+0x339/0x440\n ? __pfx_tmigr_handle_remote_up+0x10/0x10\n __walk_groups.isra.0+0x42/0x150\n tmigr_handle_remote+0x1f4/0x2e0\n ? __pfx_tmigr_handle_remote+0x10/0x10\n ? ktime_get+0x60/0x140\n ? lapic_next_event+0x11/0x20\n ? clockevents_program_event+0x1d4/0x2a0\n ? hrtimer_interrupt+0x322/0x780\n handle_softirqs+0x16a/0x550\n irq_exit_rcu+0xaf/0xe0\n sysvec_apic_timer_interrupt+0x70/0x80\n \u003c/IRQ\u003e\n...\n\nAllocated by task 141:\n kasan_save_stack+0x24/0x50\n kasan_save_track+0x14/0x30\n __kasan_kmalloc+0x7f/0x90\n __kmalloc_node_track_caller_noprof+0x198/0x430\n devm_kmalloc+0x7b/0x1e0\n tc358743_probe+0xb7/0x610 i2c_device_probe+0x51d/0x880\n really_probe+0x1ca/0x5c0\n __driver_probe_device+0x248/0x310\n driver_probe_device+0x44/0x120\n __device_attach_driver+0x174/0x220\n bus_for_each_drv+0x100/0x190\n __device_attach+0x206/0x370\n bus_probe_device+0x123/0x170\n device_add+0xd25/0x1470\n i2c_new_client_device+0x7a0/0xcd0\n do_one_initcall+0x89/0x300\n do_init_module+0x29d/0x7f0\n load_module+0x4f48/0x69e0\n init_module_from_file+0xe4/0x150\n idempotent_init_module+0x320/0x670\n __x64_sys_finit_module+0xbd/0x120\n do_syscall_64+0xac/0x280\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nFreed by task 141:\n kasan_save_stack+0x24/0x50\n kasan_save_track+0x14/0x30\n kasan_save_free_info+0x3a/0x60\n __kasan_slab_free+0x3f/0x50\n kfree+0x137/0x370\n release_nodes+0xa4/0x100\n devres_release_group+0x1b2/0x380\n i2c_device_probe+0x694/0x880\n really_probe+0x1ca/0x5c0\n __driver_probe_device+0x248/0x310\n driver_probe_device+0x44/0x120\n __device_attach_driver+0x174/0x220\n bus_for_each_drv+0x100/0x190\n __device_attach+0x206/0x370\n bus_probe_device+0x123/0x170\n device_add+0xd25/0x1470\n i2c_new_client_device+0x7a0/0xcd0\n do_one_initcall+0x89/0x300\n do_init_module+0x29d/0x7f0\n load_module+0x4f48/0x69e0\n init_module_from_file+0xe4/0x150\n idempotent_init_module+0x320/0x670\n __x64_sys_finit_module+0xbd/0x120\n do_syscall_64+0xac/0x280\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n...\n\nReplace timer_delete() with timer_delete_sync() and cancel_delayed_work()\nwith cancel_delayed_work_sync() to ensure proper termination of timer and\nwork items before resource cleanup.\n\nThis bug was initially identified through static analysis. For reproduction\nand testing, I created a functional emulation of the tc358743 device via a\nkernel module and introduced faults through the debugfs interface.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39995",
"url": "https://www.suse.com/security/cve/CVE-2025-39995"
},
{
"category": "external",
"summary": "SUSE Bug 1252064 for CVE-2025-39995",
"url": "https://bugzilla.suse.com/1252064"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-39995"
},
{
"cve": "CVE-2025-39996",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39996"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: b2c2: Fix use-after-free causing by irq_check_work in flexcop_pci_remove\n\nThe original code uses cancel_delayed_work() in flexcop_pci_remove(), which\ndoes not guarantee that the delayed work item irq_check_work has fully\ncompleted if it was already running. This leads to use-after-free scenarios\nwhere flexcop_pci_remove() may free the flexcop_device while irq_check_work\nis still active and attempts to dereference the device.\n\nA typical race condition is illustrated below:\n\nCPU 0 (remove) | CPU 1 (delayed work callback)\nflexcop_pci_remove() | flexcop_pci_irq_check_work()\n cancel_delayed_work() |\n flexcop_device_kfree(fc_pci-\u003efc_dev) |\n | fc = fc_pci-\u003efc_dev; // UAF\n\nThis is confirmed by a KASAN report:\n\n==================================================================\nBUG: KASAN: slab-use-after-free in __run_timer_base.part.0+0x7d7/0x8c0\nWrite of size 8 at addr ffff8880093aa8c8 by task bash/135\n...\nCall Trace:\n \u003cIRQ\u003e\n dump_stack_lvl+0x55/0x70\n print_report+0xcf/0x610\n ? __run_timer_base.part.0+0x7d7/0x8c0\n kasan_report+0xb8/0xf0\n ? __run_timer_base.part.0+0x7d7/0x8c0\n __run_timer_base.part.0+0x7d7/0x8c0\n ? __pfx___run_timer_base.part.0+0x10/0x10\n ? __pfx_read_tsc+0x10/0x10\n ? ktime_get+0x60/0x140\n ? lapic_next_event+0x11/0x20\n ? clockevents_program_event+0x1d4/0x2a0\n run_timer_softirq+0xd1/0x190\n handle_softirqs+0x16a/0x550\n irq_exit_rcu+0xaf/0xe0\n sysvec_apic_timer_interrupt+0x70/0x80\n \u003c/IRQ\u003e\n...\n\nAllocated by task 1:\n kasan_save_stack+0x24/0x50\n kasan_save_track+0x14/0x30\n __kasan_kmalloc+0x7f/0x90\n __kmalloc_noprof+0x1be/0x460\n flexcop_device_kmalloc+0x54/0xe0\n flexcop_pci_probe+0x1f/0x9d0\n local_pci_probe+0xdc/0x190\n pci_device_probe+0x2fe/0x470\n really_probe+0x1ca/0x5c0\n __driver_probe_device+0x248/0x310\n driver_probe_device+0x44/0x120\n __driver_attach+0xd2/0x310\n bus_for_each_dev+0xed/0x170\n bus_add_driver+0x208/0x500\n driver_register+0x132/0x460\n do_one_initcall+0x89/0x300\n kernel_init_freeable+0x40d/0x720\n kernel_init+0x1a/0x150\n ret_from_fork+0x10c/0x1a0\n ret_from_fork_asm+0x1a/0x30\n\nFreed by task 135:\n kasan_save_stack+0x24/0x50\n kasan_save_track+0x14/0x30\n kasan_save_free_info+0x3a/0x60\n __kasan_slab_free+0x3f/0x50\n kfree+0x137/0x370\n flexcop_device_kfree+0x32/0x50\n pci_device_remove+0xa6/0x1d0\n device_release_driver_internal+0xf8/0x210\n pci_stop_bus_device+0x105/0x150\n pci_stop_and_remove_bus_device_locked+0x15/0x30\n remove_store+0xcc/0xe0\n kernfs_fop_write_iter+0x2c3/0x440\n vfs_write+0x871/0xd70\n ksys_write+0xee/0x1c0\n do_syscall_64+0xac/0x280\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n...\n\nReplace cancel_delayed_work() with cancel_delayed_work_sync() to ensure\nthat the delayed work item is properly canceled and any executing delayed\nwork has finished before the device memory is deallocated.\n\nThis bug was initially identified through static analysis. To reproduce\nand test it, I simulated the B2C2 FlexCop PCI device in QEMU and introduced\nartificial delays within the flexcop_pci_irq_check_work() function to\nincrease the likelihood of triggering the bug.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39996",
"url": "https://www.suse.com/security/cve/CVE-2025-39996"
},
{
"category": "external",
"summary": "SUSE Bug 1252065 for CVE-2025-39996",
"url": "https://bugzilla.suse.com/1252065"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-39996"
},
{
"cve": "CVE-2025-39997",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39997"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: usb-audio: fix race condition to UAF in snd_usbmidi_free\n\nThe previous commit 0718a78f6a9f (\"ALSA: usb-audio: Kill timer properly at\nremoval\") patched a UAF issue caused by the error timer.\n\nHowever, because the error timer kill added in this patch occurs after the\nendpoint delete, a race condition to UAF still occurs, albeit rarely.\n\nAdditionally, since kill-cleanup for urb is also missing, freed memory can\nbe accessed in interrupt context related to urb, which can cause UAF.\n\nTherefore, to prevent this, error timer and urb must be killed before\nfreeing the heap memory.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39997",
"url": "https://www.suse.com/security/cve/CVE-2025-39997"
},
{
"category": "external",
"summary": "SUSE Bug 1252056 for CVE-2025-39997",
"url": "https://bugzilla.suse.com/1252056"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-39997"
},
{
"cve": "CVE-2025-39998",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39998"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: target: target_core_configfs: Add length check to avoid buffer overflow\n\nA buffer overflow arises from the usage of snprintf to write into the\nbuffer \"buf\" in target_lu_gp_members_show function located in\n/drivers/target/target_core_configfs.c. This buffer is allocated with\nsize LU_GROUP_NAME_BUF (256 bytes).\n\nsnprintf(...) formats multiple strings into buf with the HBA name\n(hba-\u003ehba_group.cg_item), a slash character, a devicename (dev-\u003e\ndev_group.cg_item) and a newline character, the total formatted string\nlength may exceed the buffer size of 256 bytes.\n\nSince snprintf() returns the total number of bytes that would have been\nwritten (the length of %s/%sn ), this value may exceed the buffer length\n(256 bytes) passed to memcpy(), this will ultimately cause function\nmemcpy reporting a buffer overflow error.\n\nAn additional check of the return value of snprintf() can avoid this\nbuffer overflow.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39998",
"url": "https://www.suse.com/security/cve/CVE-2025-39998"
},
{
"category": "external",
"summary": "SUSE Bug 1252073 for CVE-2025-39998",
"url": "https://bugzilla.suse.com/1252073"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-39998"
},
{
"cve": "CVE-2025-39999",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39999"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nblk-mq: fix blk_mq_tags double free while nr_requests grown\n\nIn the case user trigger tags grow by queue sysfs attribute nr_requests,\nhctx-\u003esched_tags will be freed directly and replaced with a new\nallocated tags, see blk_mq_tag_update_depth().\n\nThe problem is that hctx-\u003esched_tags is from elevator-\u003eet-\u003etags, while\net-\u003etags is still the freed tags, hence later elevator exit will try to\nfree the tags again, causing kernel panic.\n\nFix this problem by replacing et-\u003etags with new allocated tags as well.\n\nNoted there are still some long term problems that will require some\nrefactor to be fixed thoroughly[1].\n\n[1] https://lore.kernel.org/all/20250815080216.410665-1-yukuai1@huaweicloud.com/",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39999",
"url": "https://www.suse.com/security/cve/CVE-2025-39999"
},
{
"category": "external",
"summary": "SUSE Bug 1252059 for CVE-2025-39999",
"url": "https://bugzilla.suse.com/1252059"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-39999"
},
{
"cve": "CVE-2025-40000",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40000"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: rtw89: fix use-after-free in rtw89_core_tx_kick_off_and_wait()\n\nThere is a bug observed when rtw89_core_tx_kick_off_and_wait() tries to\naccess already freed skb_data:\n\n BUG: KFENCE: use-after-free write in rtw89_core_tx_kick_off_and_wait drivers/net/wireless/realtek/rtw89/core.c:1110\n\n CPU: 6 UID: 0 PID: 41377 Comm: kworker/u64:24 Not tainted 6.17.0-rc1+ #1 PREEMPT(lazy)\n Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS edk2-20250523-14.fc42 05/23/2025\n Workqueue: events_unbound cfg80211_wiphy_work [cfg80211]\n\n Use-after-free write at 0x0000000020309d9d (in kfence-#251):\n rtw89_core_tx_kick_off_and_wait drivers/net/wireless/realtek/rtw89/core.c:1110\n rtw89_core_scan_complete drivers/net/wireless/realtek/rtw89/core.c:5338\n rtw89_hw_scan_complete_cb drivers/net/wireless/realtek/rtw89/fw.c:7979\n rtw89_chanctx_proceed_cb drivers/net/wireless/realtek/rtw89/chan.c:3165\n rtw89_chanctx_proceed drivers/net/wireless/realtek/rtw89/chan.h:141\n rtw89_hw_scan_complete drivers/net/wireless/realtek/rtw89/fw.c:8012\n rtw89_mac_c2h_scanofld_rsp drivers/net/wireless/realtek/rtw89/mac.c:5059\n rtw89_fw_c2h_work drivers/net/wireless/realtek/rtw89/fw.c:6758\n process_one_work kernel/workqueue.c:3241\n worker_thread kernel/workqueue.c:3400\n kthread kernel/kthread.c:463\n ret_from_fork arch/x86/kernel/process.c:154\n ret_from_fork_asm arch/x86/entry/entry_64.S:258\n\n kfence-#251: 0x0000000056e2393d-0x000000009943cb62, size=232, cache=skbuff_head_cache\n\n allocated by task 41377 on cpu 6 at 77869.159548s (0.009551s ago):\n __alloc_skb net/core/skbuff.c:659\n __netdev_alloc_skb net/core/skbuff.c:734\n ieee80211_nullfunc_get net/mac80211/tx.c:5844\n rtw89_core_send_nullfunc drivers/net/wireless/realtek/rtw89/core.c:3431\n rtw89_core_scan_complete drivers/net/wireless/realtek/rtw89/core.c:5338\n rtw89_hw_scan_complete_cb drivers/net/wireless/realtek/rtw89/fw.c:7979\n rtw89_chanctx_proceed_cb drivers/net/wireless/realtek/rtw89/chan.c:3165\n rtw89_chanctx_proceed drivers/net/wireless/realtek/rtw89/chan.c:3194\n rtw89_hw_scan_complete drivers/net/wireless/realtek/rtw89/fw.c:8012\n rtw89_mac_c2h_scanofld_rsp drivers/net/wireless/realtek/rtw89/mac.c:5059\n rtw89_fw_c2h_work drivers/net/wireless/realtek/rtw89/fw.c:6758\n process_one_work kernel/workqueue.c:3241\n worker_thread kernel/workqueue.c:3400\n kthread kernel/kthread.c:463\n ret_from_fork arch/x86/kernel/process.c:154\n ret_from_fork_asm arch/x86/entry/entry_64.S:258\n\n freed by task 1045 on cpu 9 at 77869.168393s (0.001557s ago):\n ieee80211_tx_status_skb net/mac80211/status.c:1117\n rtw89_pci_release_txwd_skb drivers/net/wireless/realtek/rtw89/pci.c:564\n rtw89_pci_release_tx_skbs.isra.0 drivers/net/wireless/realtek/rtw89/pci.c:651\n rtw89_pci_release_tx drivers/net/wireless/realtek/rtw89/pci.c:676\n rtw89_pci_napi_poll drivers/net/wireless/realtek/rtw89/pci.c:4238\n __napi_poll net/core/dev.c:7495\n net_rx_action net/core/dev.c:7557 net/core/dev.c:7684\n handle_softirqs kernel/softirq.c:580\n do_softirq.part.0 kernel/softirq.c:480\n __local_bh_enable_ip kernel/softirq.c:407\n rtw89_pci_interrupt_threadfn drivers/net/wireless/realtek/rtw89/pci.c:927\n irq_thread_fn kernel/irq/manage.c:1133\n irq_thread kernel/irq/manage.c:1257\n kthread kernel/kthread.c:463\n ret_from_fork arch/x86/kernel/process.c:154\n ret_from_fork_asm arch/x86/entry/entry_64.S:258\n\nIt is a consequence of a race between the waiting and the signaling side\nof the completion:\n\n Waiting thread Completing thread\n\nrtw89_core_tx_kick_off_and_wait()\n rcu_assign_pointer(skb_data-\u003ewait, wait)\n /* start waiting */\n wait_for_completion_timeout()\n rtw89_pci_tx_status()\n rtw89_core_tx_wait_complete()\n rcu_read_lock()\n /* signals completion and\n \n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40000",
"url": "https://www.suse.com/security/cve/CVE-2025-40000"
},
{
"category": "external",
"summary": "SUSE Bug 1252062 for CVE-2025-40000",
"url": "https://bugzilla.suse.com/1252062"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40000"
},
{
"cve": "CVE-2025-40001",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40001"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mvsas: Fix use-after-free bugs in mvs_work_queue\n\nDuring the detaching of Marvell\u0027s SAS/SATA controller, the original code\ncalls cancel_delayed_work() in mvs_free() to cancel the delayed work\nitem mwq-\u003ework_q. However, if mwq-\u003ework_q is already running, the\ncancel_delayed_work() may fail to cancel it. This can lead to\nuse-after-free scenarios where mvs_free() frees the mvs_info while\nmvs_work_queue() is still executing and attempts to access the\nalready-freed mvs_info.\n\nA typical race condition is illustrated below:\n\nCPU 0 (remove) | CPU 1 (delayed work callback)\nmvs_pci_remove() |\n mvs_free() | mvs_work_queue()\n cancel_delayed_work() |\n kfree(mvi) |\n | mvi-\u003e // UAF\n\nReplace cancel_delayed_work() with cancel_delayed_work_sync() to ensure\nthat the delayed work item is properly canceled and any executing\ndelayed work item completes before the mvs_info is deallocated.\n\nThis bug was found by static analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40001",
"url": "https://www.suse.com/security/cve/CVE-2025-40001"
},
{
"category": "external",
"summary": "SUSE Bug 1252303 for CVE-2025-40001",
"url": "https://bugzilla.suse.com/1252303"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40001"
},
{
"cve": "CVE-2025-40002",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40002"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nthunderbolt: Fix use-after-free in tb_dp_dprx_work\n\nThe original code relies on cancel_delayed_work() in tb_dp_dprx_stop(),\nwhich does not ensure that the delayed work item tunnel-\u003edprx_work has\nfully completed if it was already running. This leads to use-after-free\nscenarios where tb_tunnel is deallocated by tb_tunnel_put(), while\ntunnel-\u003edprx_work remains active and attempts to dereference tb_tunnel\nin tb_dp_dprx_work().\n\nA typical race condition is illustrated below:\n\nCPU 0 | CPU 1\ntb_dp_tunnel_active() |\n tb_deactivate_and_free_tunnel()| tb_dp_dprx_start()\n tb_tunnel_deactivate() | queue_delayed_work()\n tb_dp_activate() |\n tb_dp_dprx_stop() | tb_dp_dprx_work() //delayed worker\n cancel_delayed_work() |\n tb_tunnel_put(tunnel); |\n | tunnel = container_of(...); //UAF\n | tunnel-\u003e //UAF\n\nReplacing cancel_delayed_work() with cancel_delayed_work_sync() is\nnot feasible as it would introduce a deadlock: both tb_dp_dprx_work()\nand the cleanup path acquire tb-\u003elock, and cancel_delayed_work_sync()\nwould wait indefinitely for the work item that cannot proceed.\n\nInstead, implement proper reference counting:\n- If cancel_delayed_work() returns true (work is pending), we release\n the reference in the stop function.\n- If it returns false (work is executing or already completed), the\n reference is released in delayed work function itself.\n\nThis ensures the tb_tunnel remains valid during work item execution\nwhile preventing memory leaks.\n\nThis bug was found by static analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40002",
"url": "https://www.suse.com/security/cve/CVE-2025-40002"
},
{
"category": "external",
"summary": "SUSE Bug 1252302 for CVE-2025-40002",
"url": "https://bugzilla.suse.com/1252302"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40002"
},
{
"cve": "CVE-2025-40003",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40003"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: mscc: ocelot: Fix use-after-free caused by cyclic delayed work\n\nThe origin code calls cancel_delayed_work() in ocelot_stats_deinit()\nto cancel the cyclic delayed work item ocelot-\u003estats_work. However,\ncancel_delayed_work() may fail to cancel the work item if it is already\nexecuting. While destroy_workqueue() does wait for all pending work items\nin the work queue to complete before destroying the work queue, it cannot\nprevent the delayed work item from being rescheduled within the\nocelot_check_stats_work() function. This limitation exists because the\ndelayed work item is only enqueued into the work queue after its timer\nexpires. Before the timer expiration, destroy_workqueue() has no visibility\nof this pending work item. Once the work queue appears empty,\ndestroy_workqueue() proceeds with destruction. When the timer eventually\nexpires, the delayed work item gets queued again, leading to the following\nwarning:\n\nworkqueue: cannot queue ocelot_check_stats_work on wq ocelot-switch-stats\nWARNING: CPU: 2 PID: 0 at kernel/workqueue.c:2255 __queue_work+0x875/0xaf0\n...\nRIP: 0010:__queue_work+0x875/0xaf0\n...\nRSP: 0018:ffff88806d108b10 EFLAGS: 00010086\nRAX: 0000000000000000 RBX: 0000000000000101 RCX: 0000000000000027\nRDX: 0000000000000027 RSI: 0000000000000004 RDI: ffff88806d123e88\nRBP: ffffffff813c3170 R08: 0000000000000000 R09: ffffed100da247d2\nR10: ffffed100da247d1 R11: ffff88806d123e8b R12: ffff88800c00f000\nR13: ffff88800d7285c0 R14: ffff88806d0a5580 R15: ffff88800d7285a0\nFS: 0000000000000000(0000) GS:ffff8880e5725000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007fe18e45ea10 CR3: 0000000005e6c000 CR4: 00000000000006f0\nCall Trace:\n \u003cIRQ\u003e\n ? kasan_report+0xc6/0xf0\n ? __pfx_delayed_work_timer_fn+0x10/0x10\n ? __pfx_delayed_work_timer_fn+0x10/0x10\n call_timer_fn+0x25/0x1c0\n __run_timer_base.part.0+0x3be/0x8c0\n ? __pfx_delayed_work_timer_fn+0x10/0x10\n ? rcu_sched_clock_irq+0xb06/0x27d0\n ? __pfx___run_timer_base.part.0+0x10/0x10\n ? try_to_wake_up+0xb15/0x1960\n ? _raw_spin_lock_irq+0x80/0xe0\n ? __pfx__raw_spin_lock_irq+0x10/0x10\n tmigr_handle_remote_up+0x603/0x7e0\n ? __pfx_tmigr_handle_remote_up+0x10/0x10\n ? sched_balance_trigger+0x1c0/0x9f0\n ? sched_tick+0x221/0x5a0\n ? _raw_spin_lock_irq+0x80/0xe0\n ? __pfx__raw_spin_lock_irq+0x10/0x10\n ? tick_nohz_handler+0x339/0x440\n ? __pfx_tmigr_handle_remote_up+0x10/0x10\n __walk_groups.isra.0+0x42/0x150\n tmigr_handle_remote+0x1f4/0x2e0\n ? __pfx_tmigr_handle_remote+0x10/0x10\n ? ktime_get+0x60/0x140\n ? lapic_next_event+0x11/0x20\n ? clockevents_program_event+0x1d4/0x2a0\n ? hrtimer_interrupt+0x322/0x780\n handle_softirqs+0x16a/0x550\n irq_exit_rcu+0xaf/0xe0\n sysvec_apic_timer_interrupt+0x70/0x80\n \u003c/IRQ\u003e\n...\n\nThe following diagram reveals the cause of the above warning:\n\nCPU 0 (remove) | CPU 1 (delayed work callback)\nmscc_ocelot_remove() |\n ocelot_deinit() | ocelot_check_stats_work()\n ocelot_stats_deinit() |\n cancel_delayed_work()| ...\n | queue_delayed_work()\n destroy_workqueue() | (wait a time)\n | __queue_work() //UAF\n\nThe above scenario actually constitutes a UAF vulnerability.\n\nThe ocelot_stats_deinit() is only invoked when initialization\nfailure or resource destruction, so we must ensure that any\ndelayed work items cannot be rescheduled.\n\nReplace cancel_delayed_work() with disable_delayed_work_sync()\nto guarantee proper cancellation of the delayed work item and\nensure completion of any currently executing work before the\nworkqueue is deallocated.\n\nA deadlock concern was considered: ocelot_stats_deinit() is called\nin a process context and is not holding any locks that the delayed\nwork item might also need. Therefore, the use of the _sync() variant\nis safe here.\n\nThis bug was identified through static analysis. To reproduce the\nissue and validate the fix, I simulated ocelot-swit\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40003",
"url": "https://www.suse.com/security/cve/CVE-2025-40003"
},
{
"category": "external",
"summary": "SUSE Bug 1252301 for CVE-2025-40003",
"url": "https://bugzilla.suse.com/1252301"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40003"
},
{
"cve": "CVE-2025-40004",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40004"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/9p: Fix buffer overflow in USB transport layer\n\nA buffer overflow vulnerability exists in the USB 9pfs transport layer\nwhere inconsistent size validation between packet header parsing and\nactual data copying allows a malicious USB host to overflow heap buffers.\n\nThe issue occurs because:\n- usb9pfs_rx_header() validates only the declared size in packet header\n- usb9pfs_rx_complete() uses req-\u003eactual (actual received bytes) for\nmemcpy\n\nThis allows an attacker to craft packets with small declared size\n(bypassing validation) but large actual payload (triggering overflow\nin memcpy).\n\nAdd validation in usb9pfs_rx_complete() to ensure req-\u003eactual does not\nexceed the buffer capacity before copying data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40004",
"url": "https://www.suse.com/security/cve/CVE-2025-40004"
},
{
"category": "external",
"summary": "SUSE Bug 1252310 for CVE-2025-40004",
"url": "https://bugzilla.suse.com/1252310"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40004"
},
{
"cve": "CVE-2025-40013",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40013"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: qcom: audioreach: fix potential null pointer dereference\n\nIt is possible that the topology parsing function\naudioreach_widget_load_module_common() could return NULL or an error\npointer. Add missing NULL check so that we do not dereference it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40013",
"url": "https://www.suse.com/security/cve/CVE-2025-40013"
},
{
"category": "external",
"summary": "SUSE Bug 1252348 for CVE-2025-40013",
"url": "https://bugzilla.suse.com/1252348"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40013"
},
{
"cve": "CVE-2025-40015",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40015"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: stm32-csi: Fix dereference before NULL check\n\nIn \u0027stm32_csi_start\u0027, \u0027csidev-\u003es_subdev\u0027 is dereferenced directly while\nassigning a value to the \u0027src_pad\u0027. However the same value is being\nchecked against NULL at a later point of time indicating that there\nare chances that the value can be NULL.\n\nMove the dereference after the NULL check.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40015",
"url": "https://www.suse.com/security/cve/CVE-2025-40015"
},
{
"category": "external",
"summary": "SUSE Bug 1252345 for CVE-2025-40015",
"url": "https://bugzilla.suse.com/1252345"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40015"
},
{
"cve": "CVE-2025-40016",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40016"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: uvcvideo: Mark invalid entities with id UVC_INVALID_ENTITY_ID\n\nPer UVC 1.1+ specification 3.7.2, units and terminals must have a non-zero\nunique ID.\n\n```\nEach Unit and Terminal within the video function is assigned a unique\nidentification number, the Unit ID (UID) or Terminal ID (TID), contained in\nthe bUnitID or bTerminalID field of the descriptor. The value 0x00 is\nreserved for undefined ID,\n```\n\nIf we add a new entity with id 0 or a duplicated ID, it will be marked\nas UVC_INVALID_ENTITY_ID.\n\nIn a previous attempt commit 3dd075fe8ebb (\"media: uvcvideo: Require\nentities to have a non-zero unique ID\"), we ignored all the invalid units,\nthis broke a lot of non-compatible cameras. Hopefully we are more lucky\nthis time.\n\nThis also prevents some syzkaller reproducers from triggering warnings due\nto a chain of entities referring to themselves. In one particular case, an\nOutput Unit is connected to an Input Unit, both with the same ID of 1. But\nwhen looking up for the source ID of the Output Unit, that same entity is\nfound instead of the input entity, which leads to such warnings.\n\nIn another case, a backward chain was considered finished as the source ID\nwas 0. Later on, that entity was found, but its pads were not valid.\n\nHere is a sample stack trace for one of those cases.\n\n[ 20.650953] usb 1-1: new high-speed USB device number 2 using dummy_hcd\n[ 20.830206] usb 1-1: Using ep0 maxpacket: 8\n[ 20.833501] usb 1-1: config 0 descriptor??\n[ 21.038518] usb 1-1: string descriptor 0 read error: -71\n[ 21.038893] usb 1-1: Found UVC 0.00 device \u003cunnamed\u003e (2833:0201)\n[ 21.039299] uvcvideo 1-1:0.0: Entity type for entity Output 1 was not initialized!\n[ 21.041583] uvcvideo 1-1:0.0: Entity type for entity Input 1 was not initialized!\n[ 21.042218] ------------[ cut here ]------------\n[ 21.042536] WARNING: CPU: 0 PID: 9 at drivers/media/mc/mc-entity.c:1147 media_create_pad_link+0x2c4/0x2e0\n[ 21.043195] Modules linked in:\n[ 21.043535] CPU: 0 UID: 0 PID: 9 Comm: kworker/0:1 Not tainted 6.11.0-rc7-00030-g3480e43aeccf #444\n[ 21.044101] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.15.0-1 04/01/2014\n[ 21.044639] Workqueue: usb_hub_wq hub_event\n[ 21.045100] RIP: 0010:media_create_pad_link+0x2c4/0x2e0\n[ 21.045508] Code: fe e8 20 01 00 00 b8 f4 ff ff ff 48 83 c4 30 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc 0f 0b eb e9 0f 0b eb 0a 0f 0b eb 06 \u003c0f\u003e 0b eb 02 0f 0b b8 ea ff ff ff eb d4 66 2e 0f 1f 84 00 00 00 00\n[ 21.046801] RSP: 0018:ffffc9000004b318 EFLAGS: 00010246\n[ 21.047227] RAX: ffff888004e5d458 RBX: 0000000000000000 RCX: ffffffff818fccf1\n[ 21.047719] RDX: 000000000000007b RSI: 0000000000000000 RDI: ffff888004313290\n[ 21.048241] RBP: ffff888004313290 R08: 0001ffffffffffff R09: 0000000000000000\n[ 21.048701] R10: 0000000000000013 R11: 0001888004313290 R12: 0000000000000003\n[ 21.049138] R13: ffff888004313080 R14: ffff888004313080 R15: 0000000000000000\n[ 21.049648] FS: 0000000000000000(0000) GS:ffff88803ec00000(0000) knlGS:0000000000000000\n[ 21.050271] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 21.050688] CR2: 0000592cc27635b0 CR3: 000000000431c000 CR4: 0000000000750ef0\n[ 21.051136] PKRU: 55555554\n[ 21.051331] Call Trace:\n[ 21.051480] \u003cTASK\u003e\n[ 21.051611] ? __warn+0xc4/0x210\n[ 21.051861] ? media_create_pad_link+0x2c4/0x2e0\n[ 21.052252] ? report_bug+0x11b/0x1a0\n[ 21.052540] ? trace_hardirqs_on+0x31/0x40\n[ 21.052901] ? handle_bug+0x3d/0x70\n[ 21.053197] ? exc_invalid_op+0x1a/0x50\n[ 21.053511] ? asm_exc_invalid_op+0x1a/0x20\n[ 21.053924] ? media_create_pad_link+0x91/0x2e0\n[ 21.054364] ? media_create_pad_link+0x2c4/0x2e0\n[ 21.054834] ? media_create_pad_link+0x91/0x2e0\n[ 21.055131] ? _raw_spin_unlock+0x1e/0x40\n[ 21.055441] ? __v4l2_device_register_subdev+0x202/0x210\n[ 21.055837] uvc_mc_register_entities+0x358/0x400\n[ 21.056144] uvc_register_chains+0x1\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40016",
"url": "https://www.suse.com/security/cve/CVE-2025-40016"
},
{
"category": "external",
"summary": "SUSE Bug 1252346 for CVE-2025-40016",
"url": "https://bugzilla.suse.com/1252346"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2025-40016"
},
{
"cve": "CVE-2025-40017",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40017"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: iris: Fix memory leak by freeing untracked persist buffer\n\nOne internal buffer which is allocated only once per session was not\nbeing freed during session close because it was not being tracked as\npart of internal buffer list which resulted in a memory leak.\n\nAdd the necessary logic to explicitly free the untracked internal buffer\nduring session close to ensure all allocated memory is released\nproperly.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40017",
"url": "https://www.suse.com/security/cve/CVE-2025-40017"
},
{
"category": "external",
"summary": "SUSE Bug 1252335 for CVE-2025-40017",
"url": "https://bugzilla.suse.com/1252335"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2025-40017"
},
{
"cve": "CVE-2025-40018",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40018"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipvs: Defer ip_vs_ftp unregister during netns cleanup\n\nOn the netns cleanup path, __ip_vs_ftp_exit() may unregister ip_vs_ftp\nbefore connections with valid cp-\u003eapp pointers are flushed, leading to a\nuse-after-free.\n\nFix this by introducing a global `exiting_module` flag, set to true in\nip_vs_ftp_exit() before unregistering the pernet subsystem. In\n__ip_vs_ftp_exit(), skip ip_vs_ftp unregister if called during netns\ncleanup (when exiting_module is false) and defer it to\n__ip_vs_cleanup_batch(), which unregisters all apps after all connections\nare flushed. If called during module exit, unregister ip_vs_ftp\nimmediately.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40018",
"url": "https://www.suse.com/security/cve/CVE-2025-40018"
},
{
"category": "external",
"summary": "SUSE Bug 1247374 for CVE-2025-40018",
"url": "https://bugzilla.suse.com/1247374"
},
{
"category": "external",
"summary": "SUSE Bug 1252688 for CVE-2025-40018",
"url": "https://bugzilla.suse.com/1252688"
},
{
"category": "external",
"summary": "SUSE Bug 1252689 for CVE-2025-40018",
"url": "https://bugzilla.suse.com/1252689"
},
{
"category": "external",
"summary": "SUSE Bug 1253291 for CVE-2025-40018",
"url": "https://bugzilla.suse.com/1253291"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-40018"
},
{
"cve": "CVE-2025-40019",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40019"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: essiv - Check ssize for decryption and in-place encryption\n\nMove the ssize check to the start in essiv_aead_crypt so that\nit\u0027s also checked for decryption and in-place encryption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40019",
"url": "https://www.suse.com/security/cve/CVE-2025-40019"
},
{
"category": "external",
"summary": "SUSE Bug 1252678 for CVE-2025-40019",
"url": "https://bugzilla.suse.com/1252678"
},
{
"category": "external",
"summary": "SUSE Bug 1252719 for CVE-2025-40019",
"url": "https://bugzilla.suse.com/1252719"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-40019"
},
{
"cve": "CVE-2025-40025",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40025"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nf2fs: fix to do sanity check on node footer for non inode dnode\n\nAs syzbot reported below:\n\n------------[ cut here ]------------\nkernel BUG at fs/f2fs/file.c:1243!\nOops: invalid opcode: 0000 [#1] SMP KASAN NOPTI\nCPU: 0 UID: 0 PID: 5354 Comm: syz.0.0 Not tainted 6.17.0-rc1-syzkaller-00211-g90d970cade8e #0 PREEMPT(full)\nRIP: 0010:f2fs_truncate_hole+0x69e/0x6c0 fs/f2fs/file.c:1243\nCall Trace:\n \u003cTASK\u003e\n f2fs_punch_hole+0x2db/0x330 fs/f2fs/file.c:1306\n f2fs_fallocate+0x546/0x990 fs/f2fs/file.c:2018\n vfs_fallocate+0x666/0x7e0 fs/open.c:342\n ksys_fallocate fs/open.c:366 [inline]\n __do_sys_fallocate fs/open.c:371 [inline]\n __se_sys_fallocate fs/open.c:369 [inline]\n __x64_sys_fallocate+0xc0/0x110 fs/open.c:369\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7f1e65f8ebe9\n\nw/ a fuzzed image, f2fs may encounter panic due to it detects inconsistent\ntruncation range in direct node in f2fs_truncate_hole().\n\nThe root cause is: a non-inode dnode may has the same footer.ino and\nfooter.nid, so the dnode will be parsed as an inode, then ADDRS_PER_PAGE()\nmay return wrong blkaddr count which may be 923 typically, by chance,\ndn.ofs_in_node is equal to 923, then count can be calculated to 0 in below\nstatement, later it will trigger panic w/ f2fs_bug_on(, count == 0 || ...).\n\n\tcount = min(end_offset - dn.ofs_in_node, pg_end - pg_start);\n\nThis patch introduces a new node_type NODE_TYPE_NON_INODE, then allowing\npassing the new_type to sanity_check_node_footer in f2fs_get_node_folio()\nto detect corruption that a non-inode dnode has the same footer.ino and\nfooter.nid.\n\nScripts to reproduce:\nmkfs.f2fs -f /dev/vdb\nmount /dev/vdb /mnt/f2fs\ntouch /mnt/f2fs/foo\ntouch /mnt/f2fs/bar\ndd if=/dev/zero of=/mnt/f2fs/foo bs=1M count=8\numount /mnt/f2fs\ninject.f2fs --node --mb i_nid --nid 4 --idx 0 --val 5 /dev/vdb\nmount /dev/vdb /mnt/f2fs\nxfs_io /mnt/f2fs/foo -c \"fpunch 6984k 4k\"",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40025",
"url": "https://www.suse.com/security/cve/CVE-2025-40025"
},
{
"category": "external",
"summary": "SUSE Bug 1252766 for CVE-2025-40025",
"url": "https://bugzilla.suse.com/1252766"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40025"
},
{
"cve": "CVE-2025-40026",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40026"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: x86: Don\u0027t (re)check L1 intercepts when completing userspace I/O\n\nWhen completing emulation of instruction that generated a userspace exit\nfor I/O, don\u0027t recheck L1 intercepts as KVM has already finished that\nphase of instruction execution, i.e. has already committed to allowing L2\nto perform I/O. If L1 (or host userspace) modifies the I/O permission\nbitmaps during the exit to userspace, KVM will treat the access as being\nintercepted despite already having emulated the I/O access.\n\nPivot on EMULTYPE_NO_DECODE to detect that KVM is completing emulation.\nOf the three users of EMULTYPE_NO_DECODE, only complete_emulated_io() (the\nintended \"recipient\") can reach the code in question. gp_interception()\u0027s\nuse is mutually exclusive with is_guest_mode(), and\ncomplete_emulated_insn_gp() unconditionally pairs EMULTYPE_NO_DECODE with\nEMULTYPE_SKIP.\n\nThe bad behavior was detected by a syzkaller program that toggles port I/O\ninterception during the userspace I/O exit, ultimately resulting in a WARN\non vcpu-\u003earch.pio.count being non-zero due to KVM no completing emulation\nof the I/O instruction.\n\n WARNING: CPU: 23 PID: 1083 at arch/x86/kvm/x86.c:8039 emulator_pio_in_out+0x154/0x170 [kvm]\n Modules linked in: kvm_intel kvm irqbypass\n CPU: 23 UID: 1000 PID: 1083 Comm: repro Not tainted 6.16.0-rc5-c1610d2d66b1-next-vm #74 NONE\n Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015\n RIP: 0010:emulator_pio_in_out+0x154/0x170 [kvm]\n PKRU: 55555554\n Call Trace:\n \u003cTASK\u003e\n kvm_fast_pio+0xd6/0x1d0 [kvm]\n vmx_handle_exit+0x149/0x610 [kvm_intel]\n kvm_arch_vcpu_ioctl_run+0xda8/0x1ac0 [kvm]\n kvm_vcpu_ioctl+0x244/0x8c0 [kvm]\n __x64_sys_ioctl+0x8a/0xd0\n do_syscall_64+0x5d/0xc60\n entry_SYSCALL_64_after_hwframe+0x4b/0x53\n \u003c/TASK\u003e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40026",
"url": "https://www.suse.com/security/cve/CVE-2025-40026"
},
{
"category": "external",
"summary": "SUSE Bug 1252764 for CVE-2025-40026",
"url": "https://bugzilla.suse.com/1252764"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.6,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2025-40026"
},
{
"cve": "CVE-2025-40027",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40027"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/9p: fix double req put in p9_fd_cancelled\n\nSyzkaller reports a KASAN issue as below:\n\ngeneral protection fault, probably for non-canonical address 0xfbd59c0000000021: 0000 [#1] PREEMPT SMP KASAN NOPTI\nKASAN: maybe wild-memory-access in range [0xdead000000000108-0xdead00000000010f]\nCPU: 0 PID: 5083 Comm: syz-executor.2 Not tainted 6.1.134-syzkaller-00037-g855bd1d7d838 #0\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014\nRIP: 0010:__list_del include/linux/list.h:114 [inline]\nRIP: 0010:__list_del_entry include/linux/list.h:137 [inline]\nRIP: 0010:list_del include/linux/list.h:148 [inline]\nRIP: 0010:p9_fd_cancelled+0xe9/0x200 net/9p/trans_fd.c:734\n\nCall Trace:\n \u003cTASK\u003e\n p9_client_flush+0x351/0x440 net/9p/client.c:614\n p9_client_rpc+0xb6b/0xc70 net/9p/client.c:734\n p9_client_version net/9p/client.c:920 [inline]\n p9_client_create+0xb51/0x1240 net/9p/client.c:1027\n v9fs_session_init+0x1f0/0x18f0 fs/9p/v9fs.c:408\n v9fs_mount+0xba/0xcb0 fs/9p/vfs_super.c:126\n legacy_get_tree+0x108/0x220 fs/fs_context.c:632\n vfs_get_tree+0x8e/0x300 fs/super.c:1573\n do_new_mount fs/namespace.c:3056 [inline]\n path_mount+0x6a6/0x1e90 fs/namespace.c:3386\n do_mount fs/namespace.c:3399 [inline]\n __do_sys_mount fs/namespace.c:3607 [inline]\n __se_sys_mount fs/namespace.c:3584 [inline]\n __x64_sys_mount+0x283/0x300 fs/namespace.c:3584\n do_syscall_x64 arch/x86/entry/common.c:51 [inline]\n do_syscall_64+0x35/0x80 arch/x86/entry/common.c:81\n entry_SYSCALL_64_after_hwframe+0x6e/0xd8\n\nThis happens because of a race condition between:\n\n- The 9p client sending an invalid flush request and later cleaning it up;\n- The 9p client in p9_read_work() canceled all pending requests.\n\n Thread 1 Thread 2\n ...\n p9_client_create()\n ...\n p9_fd_create()\n ...\n p9_conn_create()\n ...\n // start Thread 2\n INIT_WORK(\u0026m-\u003erq, p9_read_work);\n p9_read_work()\n ...\n p9_client_rpc()\n ...\n ...\n p9_conn_cancel()\n ...\n spin_lock(\u0026m-\u003ereq_lock);\n ...\n p9_fd_cancelled()\n ...\n ...\n spin_unlock(\u0026m-\u003ereq_lock);\n // status rewrite\n p9_client_cb(m-\u003eclient, req, REQ_STATUS_ERROR)\n // first remove\n list_del(\u0026req-\u003ereq_list);\n ...\n\n spin_lock(\u0026m-\u003ereq_lock)\n ...\n // second remove\n list_del(\u0026req-\u003ereq_list);\n spin_unlock(\u0026m-\u003ereq_lock)\n ...\n\nCommit 74d6a5d56629 (\"9p/trans_fd: Fix concurrency del of req_list in\np9_fd_cancelled/p9_read_work\") fixes a concurrency issue in the 9p filesystem\nclient where the req_list could be deleted simultaneously by both\np9_read_work and p9_fd_cancelled functions, but for the case where req-\u003estatus\nequals REQ_STATUS_RCVD.\n\nUpdate the check for req-\u003estatus in p9_fd_cancelled to skip processing not\njust received requests, but anything that is not SENT, as whatever\nchanged the state from SENT also removed the request from its list.\n\nFound by Linux Verification Center (linuxtesting.org) with Syzkaller.\n\n[updated the check from status == RECV || status == ERROR to status != SENT]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40027",
"url": "https://www.suse.com/security/cve/CVE-2025-40027"
},
{
"category": "external",
"summary": "SUSE Bug 1252763 for CVE-2025-40027",
"url": "https://bugzilla.suse.com/1252763"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40027"
},
{
"cve": "CVE-2025-40028",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40028"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbinder: fix double-free in dbitmap\n\nA process might fail to allocate a new bitmap when trying to expand its\nproc-\u003edmap. In that case, dbitmap_grow() fails and frees the old bitmap\nvia dbitmap_free(). However, the driver calls dbitmap_free() again when\nthe same process terminates, leading to a double-free error:\n\n ==================================================================\n BUG: KASAN: double-free in binder_proc_dec_tmpref+0x2e0/0x55c\n Free of addr ffff00000b7c1420 by task kworker/9:1/209\n\n CPU: 9 UID: 0 PID: 209 Comm: kworker/9:1 Not tainted 6.17.0-rc6-dirty #5 PREEMPT\n Hardware name: linux,dummy-virt (DT)\n Workqueue: events binder_deferred_func\n Call trace:\n kfree+0x164/0x31c\n binder_proc_dec_tmpref+0x2e0/0x55c\n binder_deferred_func+0xc24/0x1120\n process_one_work+0x520/0xba4\n [...]\n\n Allocated by task 448:\n __kmalloc_noprof+0x178/0x3c0\n bitmap_zalloc+0x24/0x30\n binder_open+0x14c/0xc10\n [...]\n\n Freed by task 449:\n kfree+0x184/0x31c\n binder_inc_ref_for_node+0xb44/0xe44\n binder_transaction+0x29b4/0x7fbc\n binder_thread_write+0x1708/0x442c\n binder_ioctl+0x1b50/0x2900\n [...]\n ==================================================================\n\nFix this issue by marking proc-\u003emap NULL in dbitmap_free().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40028",
"url": "https://www.suse.com/security/cve/CVE-2025-40028"
},
{
"category": "external",
"summary": "SUSE Bug 1252762 for CVE-2025-40028",
"url": "https://bugzilla.suse.com/1252762"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40028"
},
{
"cve": "CVE-2025-40029",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40029"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbus: fsl-mc: Check return value of platform_get_resource()\n\nplatform_get_resource() returns NULL in case of failure, so check its\nreturn value and propagate the error in order to prevent NULL pointer\ndereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40029",
"url": "https://www.suse.com/security/cve/CVE-2025-40029"
},
{
"category": "external",
"summary": "SUSE Bug 1252772 for CVE-2025-40029",
"url": "https://bugzilla.suse.com/1252772"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40029"
},
{
"cve": "CVE-2025-40030",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40030"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npinctrl: check the return value of pinmux_ops::get_function_name()\n\nWhile the API contract in docs doesn\u0027t specify it explicitly, the\ngeneric implementation of the get_function_name() callback from struct\npinmux_ops - pinmux_generic_get_function_name() - can fail and return\nNULL. This is already checked in pinmux_check_ops() so add a similar\ncheck in pinmux_func_name_to_selector() instead of passing the returned\npointer right down to strcmp() where the NULL can get dereferenced. This\nis normal operation when adding new pinfunctions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40030",
"url": "https://www.suse.com/security/cve/CVE-2025-40030"
},
{
"category": "external",
"summary": "SUSE Bug 1252773 for CVE-2025-40030",
"url": "https://bugzilla.suse.com/1252773"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40030"
},
{
"cve": "CVE-2025-40031",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40031"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntee: fix register_shm_helper()\n\nIn register_shm_helper(), fix incorrect error handling for a call to\niov_iter_extract_pages(). A case is missing for when\niov_iter_extract_pages() only got some pages and return a number larger\nthan 0, but not the requested amount.\n\nThis fixes a possible NULL pointer dereference following a bad input from\nioctl(TEE_IOC_SHM_REGISTER) where parts of the buffer isn\u0027t mapped.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40031",
"url": "https://www.suse.com/security/cve/CVE-2025-40031"
},
{
"category": "external",
"summary": "SUSE Bug 1252779 for CVE-2025-40031",
"url": "https://bugzilla.suse.com/1252779"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40031"
},
{
"cve": "CVE-2025-40032",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40032"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nPCI: endpoint: pci-epf-test: Add NULL check for DMA channels before release\n\nThe fields dma_chan_tx and dma_chan_rx of the struct pci_epf_test can be\nNULL even after EPF initialization. Then it is prudent to check that\nthey have non-NULL values before releasing the channels. Add the checks\nin pci_epf_test_clean_dma_chan().\n\nWithout the checks, NULL pointer dereferences happen and they can lead\nto a kernel panic in some cases:\n\n Unable to handle kernel NULL pointer dereference at virtual address 0000000000000050\n Call trace:\n dma_release_channel+0x2c/0x120 (P)\n pci_epf_test_epc_deinit+0x94/0xc0 [pci_epf_test]\n pci_epc_deinit_notify+0x74/0xc0\n tegra_pcie_ep_pex_rst_irq+0x250/0x5d8\n irq_thread_fn+0x34/0xb8\n irq_thread+0x18c/0x2e8\n kthread+0x14c/0x210\n ret_from_fork+0x10/0x20\n\n[mani: trimmed the stack trace]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40032",
"url": "https://www.suse.com/security/cve/CVE-2025-40032"
},
{
"category": "external",
"summary": "SUSE Bug 1252841 for CVE-2025-40032",
"url": "https://bugzilla.suse.com/1252841"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40032"
},
{
"cve": "CVE-2025-40033",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40033"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nremoteproc: pru: Fix potential NULL pointer dereference in pru_rproc_set_ctable()\n\npru_rproc_set_ctable() accessed rproc-\u003epriv before the IS_ERR_OR_NULL\ncheck, which could lead to a null pointer dereference. Move the pru\nassignment, ensuring we never dereference a NULL rproc pointer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40033",
"url": "https://www.suse.com/security/cve/CVE-2025-40033"
},
{
"category": "external",
"summary": "SUSE Bug 1252824 for CVE-2025-40033",
"url": "https://bugzilla.suse.com/1252824"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40033"
},
{
"cve": "CVE-2025-40034",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40034"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nPCI/AER: Avoid NULL pointer dereference in aer_ratelimit()\n\nWhen platform firmware supplies error information to the OS, e.g., via the\nACPI APEI GHES mechanism, it may identify an error source device that\ndoesn\u0027t advertise an AER Capability and therefore dev-\u003eaer_info, which\ncontains AER stats and ratelimiting data, is NULL.\n\npci_dev_aer_stats_incr() already checks dev-\u003eaer_info for NULL, but\naer_ratelimit() did not, leading to NULL pointer dereferences like this one\nfrom the URL below:\n\n {1}[Hardware Error]: Hardware error from APEI Generic Hardware Error Source: 0\n {1}[Hardware Error]: event severity: corrected\n {1}[Hardware Error]: device_id: 0000:00:00.0\n {1}[Hardware Error]: vendor_id: 0x8086, device_id: 0x2020\n {1}[Hardware Error]: aer_cor_status: 0x00001000, aer_cor_mask: 0x00002000\n BUG: kernel NULL pointer dereference, address: 0000000000000264\n RIP: 0010:___ratelimit+0xc/0x1b0\n pci_print_aer+0x141/0x360\n aer_recover_work_func+0xb5/0x130\n\n[8086:2020] is an Intel \"Sky Lake-E DMI3 Registers\" device that claims to\nbe a Root Port but does not advertise an AER Capability.\n\nAdd a NULL check in aer_ratelimit() to avoid the NULL pointer dereference.\nNote that this also prevents ratelimiting these events from GHES.\n\n[bhelgaas: add crash details to commit log]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40034",
"url": "https://www.suse.com/security/cve/CVE-2025-40034"
},
{
"category": "external",
"summary": "SUSE Bug 1252868 for CVE-2025-40034",
"url": "https://bugzilla.suse.com/1252868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40034"
},
{
"cve": "CVE-2025-40035",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40035"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nInput: uinput - zero-initialize uinput_ff_upload_compat to avoid info leak\n\nStruct ff_effect_compat is embedded twice inside\nuinput_ff_upload_compat, contains internal padding. In particular, there\nis a hole after struct ff_replay to satisfy alignment requirements for\nthe following union member. Without clearing the structure,\ncopy_to_user() may leak stack data to userspace.\n\nInitialize ff_up_compat to zero before filling valid fields.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40035",
"url": "https://www.suse.com/security/cve/CVE-2025-40035"
},
{
"category": "external",
"summary": "SUSE Bug 1252866 for CVE-2025-40035",
"url": "https://bugzilla.suse.com/1252866"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40035"
},
{
"cve": "CVE-2025-40036",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40036"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmisc: fastrpc: fix possible map leak in fastrpc_put_args\n\ncopy_to_user() failure would cause an early return without cleaning up\nthe fdlist, which has been updated by the DSP. This could lead to map\nleak. Fix this by redirecting to a cleanup path on failure, ensuring\nthat all mapped buffers are properly released before returning.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40036",
"url": "https://www.suse.com/security/cve/CVE-2025-40036"
},
{
"category": "external",
"summary": "SUSE Bug 1252865 for CVE-2025-40036",
"url": "https://bugzilla.suse.com/1252865"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40036"
},
{
"cve": "CVE-2025-40037",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40037"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfbdev: simplefb: Fix use after free in simplefb_detach_genpds()\n\nThe pm_domain cleanup can not be devres managed as it uses struct\nsimplefb_par which is allocated within struct fb_info by\nframebuffer_alloc(). This allocation is explicitly freed by\nunregister_framebuffer() in simplefb_remove().\nDevres managed cleanup runs after the device remove call and thus can no\nlonger access struct simplefb_par.\nCall simplefb_detach_genpds() explicitly from simplefb_destroy() like\nthe cleanup functions for clocks and regulators.\n\nFixes an use after free on M2 Mac mini during\naperture_remove_conflicting_devices() using the downstream asahi kernel\nwith Debian\u0027s kernel config. For unknown reasons this started to\nconsistently dereference an invalid pointer in v6.16.3 based kernels.\n\n[ 6.736134] BUG: KASAN: slab-use-after-free in simplefb_detach_genpds+0x58/0x220\n[ 6.743545] Read of size 4 at addr ffff8000304743f0 by task (udev-worker)/227\n[ 6.750697]\n[ 6.752182] CPU: 6 UID: 0 PID: 227 Comm: (udev-worker) Tainted: G S 6.16.3-asahi+ #16 PREEMPTLAZY\n[ 6.752186] Tainted: [S]=CPU_OUT_OF_SPEC\n[ 6.752187] Hardware name: Apple Mac mini (M2, 2023) (DT)\n[ 6.752189] Call trace:\n[ 6.752190] show_stack+0x34/0x98 (C)\n[ 6.752194] dump_stack_lvl+0x60/0x80\n[ 6.752197] print_report+0x17c/0x4d8\n[ 6.752201] kasan_report+0xb4/0x100\n[ 6.752206] __asan_report_load4_noabort+0x20/0x30\n[ 6.752209] simplefb_detach_genpds+0x58/0x220\n[ 6.752213] devm_action_release+0x50/0x98\n[ 6.752216] release_nodes+0xd0/0x2c8\n[ 6.752219] devres_release_all+0xfc/0x178\n[ 6.752221] device_unbind_cleanup+0x28/0x168\n[ 6.752224] device_release_driver_internal+0x34c/0x470\n[ 6.752228] device_release_driver+0x20/0x38\n[ 6.752231] bus_remove_device+0x1b0/0x380\n[ 6.752234] device_del+0x314/0x820\n[ 6.752238] platform_device_del+0x3c/0x1e8\n[ 6.752242] platform_device_unregister+0x20/0x50\n[ 6.752246] aperture_detach_platform_device+0x1c/0x30\n[ 6.752250] aperture_detach_devices+0x16c/0x290\n[ 6.752253] aperture_remove_conflicting_devices+0x34/0x50\n...\n[ 6.752343]\n[ 6.967409] Allocated by task 62:\n[ 6.970724] kasan_save_stack+0x3c/0x70\n[ 6.974560] kasan_save_track+0x20/0x40\n[ 6.978397] kasan_save_alloc_info+0x40/0x58\n[ 6.982670] __kasan_kmalloc+0xd4/0xd8\n[ 6.986420] __kmalloc_noprof+0x194/0x540\n[ 6.990432] framebuffer_alloc+0xc8/0x130\n[ 6.994444] simplefb_probe+0x258/0x2378\n...\n[ 7.054356]\n[ 7.055838] Freed by task 227:\n[ 7.058891] kasan_save_stack+0x3c/0x70\n[ 7.062727] kasan_save_track+0x20/0x40\n[ 7.066565] kasan_save_free_info+0x4c/0x80\n[ 7.070751] __kasan_slab_free+0x6c/0xa0\n[ 7.074675] kfree+0x10c/0x380\n[ 7.077727] framebuffer_release+0x5c/0x90\n[ 7.081826] simplefb_destroy+0x1b4/0x2c0\n[ 7.085837] put_fb_info+0x98/0x100\n[ 7.089326] unregister_framebuffer+0x178/0x320\n[ 7.093861] simplefb_remove+0x3c/0x60\n[ 7.097611] platform_remove+0x60/0x98\n[ 7.101361] device_remove+0xb8/0x160\n[ 7.105024] device_release_driver_internal+0x2fc/0x470\n[ 7.110256] device_release_driver+0x20/0x38\n[ 7.114529] bus_remove_device+0x1b0/0x380\n[ 7.118628] device_del+0x314/0x820\n[ 7.122116] platform_device_del+0x3c/0x1e8\n[ 7.126302] platform_device_unregister+0x20/0x50\n[ 7.131012] aperture_detach_platform_device+0x1c/0x30\n[ 7.136157] aperture_detach_devices+0x16c/0x290\n[ 7.140779] aperture_remove_conflicting_devices+0x34/0x50\n...",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40037",
"url": "https://www.suse.com/security/cve/CVE-2025-40037"
},
{
"category": "external",
"summary": "SUSE Bug 1252819 for CVE-2025-40037",
"url": "https://bugzilla.suse.com/1252819"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40037"
},
{
"cve": "CVE-2025-40038",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40038"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: SVM: Skip fastpath emulation on VM-Exit if next RIP isn\u0027t valid\n\nSkip the WRMSR and HLT fastpaths in SVM\u0027s VM-Exit handler if the next RIP\nisn\u0027t valid, e.g. because KVM is running with nrips=false. SVM must\ndecode and emulate to skip the instruction if the CPU doesn\u0027t provide the\nnext RIP, and getting the instruction bytes to decode requires reading\nguest memory. Reading guest memory through the emulator can fault, i.e.\ncan sleep, which is disallowed since the fastpath handlers run with IRQs\ndisabled.\n\n BUG: sleeping function called from invalid context at ./include/linux/uaccess.h:106\n in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 32611, name: qemu\n preempt_count: 1, expected: 0\n INFO: lockdep is turned off.\n irq event stamp: 30580\n hardirqs last enabled at (30579): [\u003cffffffffc08b2527\u003e] vcpu_run+0x1787/0x1db0 [kvm]\n hardirqs last disabled at (30580): [\u003cffffffffb4f62e32\u003e] __schedule+0x1e2/0xed0\n softirqs last enabled at (30570): [\u003cffffffffb4247a64\u003e] fpu_swap_kvm_fpstate+0x44/0x210\n softirqs last disabled at (30568): [\u003cffffffffb4247a64\u003e] fpu_swap_kvm_fpstate+0x44/0x210\n CPU: 298 UID: 0 PID: 32611 Comm: qemu Tainted: G U 6.16.0-smp--e6c618b51cfe-sleep #782 NONE\n Tainted: [U]=USER\n Hardware name: Google Astoria-Turin/astoria, BIOS 0.20241223.2-0 01/17/2025\n Call Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x7d/0xb0\n __might_resched+0x271/0x290\n __might_fault+0x28/0x80\n kvm_vcpu_read_guest_page+0x8d/0xc0 [kvm]\n kvm_fetch_guest_virt+0x92/0xc0 [kvm]\n __do_insn_fetch_bytes+0xf3/0x1e0 [kvm]\n x86_decode_insn+0xd1/0x1010 [kvm]\n x86_emulate_instruction+0x105/0x810 [kvm]\n __svm_skip_emulated_instruction+0xc4/0x140 [kvm_amd]\n handle_fastpath_invd+0xc4/0x1a0 [kvm]\n vcpu_run+0x11a1/0x1db0 [kvm]\n kvm_arch_vcpu_ioctl_run+0x5cc/0x730 [kvm]\n kvm_vcpu_ioctl+0x578/0x6a0 [kvm]\n __se_sys_ioctl+0x6d/0xb0\n do_syscall_64+0x8a/0x2c0\n entry_SYSCALL_64_after_hwframe+0x4b/0x53\n RIP: 0033:0x7f479d57a94b\n \u003c/TASK\u003e\n\nNote, this is essentially a reapply of commit 5c30e8101e8d (\"KVM: SVM:\nSkip WRMSR fastpath on VM-Exit if next RIP isn\u0027t valid\"), but with\ndifferent justification (KVM now grabs SRCU when skipping the instruction\nfor other reasons).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40038",
"url": "https://www.suse.com/security/cve/CVE-2025-40038"
},
{
"category": "external",
"summary": "SUSE Bug 1252817 for CVE-2025-40038",
"url": "https://bugzilla.suse.com/1252817"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40038"
},
{
"cve": "CVE-2025-40039",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40039"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nksmbd: Fix race condition in RPC handle list access\n\nThe \u0027sess-\u003erpc_handle_list\u0027 XArray manages RPC handles within a ksmbd\nsession. Access to this list is intended to be protected by\n\u0027sess-\u003erpc_lock\u0027 (an rw_semaphore). However, the locking implementation was\nflawed, leading to potential race conditions.\n\nIn ksmbd_session_rpc_open(), the code incorrectly acquired only a read lock\nbefore calling xa_store() and xa_erase(). Since these operations modify\nthe XArray structure, a write lock is required to ensure exclusive access\nand prevent data corruption from concurrent modifications.\n\nFurthermore, ksmbd_session_rpc_method() accessed the list using xa_load()\nwithout holding any lock at all. This could lead to reading inconsistent\ndata or a potential use-after-free if an entry is concurrently removed and\nthe pointer is dereferenced.\n\nFix these issues by:\n1. Using down_write() and up_write() in ksmbd_session_rpc_open()\n to ensure exclusive access during XArray modification, and ensuring\n the lock is correctly released on error paths.\n2. Adding down_read() and up_read() in ksmbd_session_rpc_method()\n to safely protect the lookup.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40039",
"url": "https://www.suse.com/security/cve/CVE-2025-40039"
},
{
"category": "external",
"summary": "SUSE Bug 1252783 for CVE-2025-40039",
"url": "https://bugzilla.suse.com/1252783"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40039"
},
{
"cve": "CVE-2025-40040",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40040"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/ksm: fix flag-dropping behavior in ksm_madvise\n\nsyzkaller discovered the following crash: (kernel BUG)\n\n[ 44.607039] ------------[ cut here ]------------\n[ 44.607422] kernel BUG at mm/userfaultfd.c:2067!\n[ 44.608148] Oops: invalid opcode: 0000 [#1] SMP DEBUG_PAGEALLOC KASAN NOPTI\n[ 44.608814] CPU: 1 UID: 0 PID: 2475 Comm: reproducer Not tainted 6.16.0-rc6 #1 PREEMPT(none)\n[ 44.609635] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014\n[ 44.610695] RIP: 0010:userfaultfd_release_all+0x3a8/0x460\n\n\u003csnip other registers, drop unreliable trace\u003e\n\n[ 44.617726] Call Trace:\n[ 44.617926] \u003cTASK\u003e\n[ 44.619284] userfaultfd_release+0xef/0x1b0\n[ 44.620976] __fput+0x3f9/0xb60\n[ 44.621240] fput_close_sync+0x110/0x210\n[ 44.622222] __x64_sys_close+0x8f/0x120\n[ 44.622530] do_syscall_64+0x5b/0x2f0\n[ 44.622840] entry_SYSCALL_64_after_hwframe+0x76/0x7e\n[ 44.623244] RIP: 0033:0x7f365bb3f227\n\nKernel panics because it detects UFFD inconsistency during\nuserfaultfd_release_all(). Specifically, a VMA which has a valid pointer\nto vma-\u003evm_userfaultfd_ctx, but no UFFD flags in vma-\u003evm_flags.\n\nThe inconsistency is caused in ksm_madvise(): when user calls madvise()\nwith MADV_UNMEARGEABLE on a VMA that is registered for UFFD in MINOR mode,\nit accidentally clears all flags stored in the upper 32 bits of\nvma-\u003evm_flags.\n\nAssuming x86_64 kernel build, unsigned long is 64-bit and unsigned int and\nint are 32-bit wide. This setup causes the following mishap during the \u0026=\n~VM_MERGEABLE assignment.\n\nVM_MERGEABLE is a 32-bit constant of type unsigned int, 0x8000\u00270000. \nAfter ~ is applied, it becomes 0x7fff\u0027ffff unsigned int, which is then\npromoted to unsigned long before the \u0026 operation. This promotion fills\nupper 32 bits with leading 0s, as we\u0027re doing unsigned conversion (and\neven for a signed conversion, this wouldn\u0027t help as the leading bit is 0).\n\u0026 operation thus ends up AND-ing vm_flags with 0x0000\u00270000\u00277fff\u0027ffff\ninstead of intended 0xffff\u0027ffff\u00277fff\u0027ffff and hence accidentally clears\nthe upper 32-bits of its value.\n\nFix it by changing `VM_MERGEABLE` constant to unsigned long, using the\nBIT() macro.\n\nNote: other VM_* flags are not affected: This only happens to the\nVM_MERGEABLE flag, as the other VM_* flags are all constants of type int\nand after ~ operation, they end up with leading 1 and are thus converted\nto unsigned long with leading 1s.\n\nNote 2:\nAfter commit 31defc3b01d9 (\"userfaultfd: remove (VM_)BUG_ON()s\"), this is\nno longer a kernel BUG, but a WARNING at the same place:\n\n[ 45.595973] WARNING: CPU: 1 PID: 2474 at mm/userfaultfd.c:2067\n\nbut the root-cause (flag-drop) remains the same.\n\n[akpm@linux-foundation.org: rust bindgen wasn\u0027t able to handle BIT(), from Miguel]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40040",
"url": "https://www.suse.com/security/cve/CVE-2025-40040"
},
{
"category": "external",
"summary": "SUSE Bug 1252780 for CVE-2025-40040",
"url": "https://bugzilla.suse.com/1252780"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40040"
},
{
"cve": "CVE-2025-40041",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40041"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nLoongArch: BPF: Sign-extend struct ops return values properly\n\nThe ns_bpf_qdisc selftest triggers a kernel panic:\n\n Oops[#1]:\n CPU 0 Unable to handle kernel paging request at virtual address 0000000000741d58, era == 90000000851b5ac0, ra == 90000000851b5aa4\n CPU: 0 UID: 0 PID: 449 Comm: test_progs Tainted: G OE 6.16.0+ #3 PREEMPT(full)\n Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE\n Hardware name: QEMU QEMU Virtual Machine, BIOS unknown 2/2/2022\n pc 90000000851b5ac0 ra 90000000851b5aa4 tp 90000001076b8000 sp 90000001076bb600\n a0 0000000000741ce8 a1 0000000000000001 a2 90000001076bb5c0 a3 0000000000000008\n a4 90000001004c4620 a5 9000000100741ce8 a6 0000000000000000 a7 0100000000000000\n t0 0000000000000010 t1 0000000000000000 t2 9000000104d24d30 t3 0000000000000001\n t4 4f2317da8a7e08c4 t5 fffffefffc002f00 t6 90000001004c4620 t7 ffffffffc61c5b3d\n t8 0000000000000000 u0 0000000000000001 s9 0000000000000050 s0 90000001075bc800\n s1 0000000000000040 s2 900000010597c400 s3 0000000000000008 s4 90000001075bc880\n s5 90000001075bc8f0 s6 0000000000000000 s7 0000000000741ce8 s8 0000000000000000\n ra: 90000000851b5aa4 __qdisc_run+0xac/0x8d8\n ERA: 90000000851b5ac0 __qdisc_run+0xc8/0x8d8\n CRMD: 000000b0 (PLV0 -IE -DA +PG DACF=CC DACM=CC -WE)\n PRMD: 00000004 (PPLV0 +PIE -PWE)\n EUEN: 00000007 (+FPE +SXE +ASXE -BTE)\n ECFG: 00071c1d (LIE=0,2-4,10-12 VS=7)\n ESTAT: 00010000 [PIL] (IS= ECode=1 EsubCode=0)\n BADV: 0000000000741d58\n PRID: 0014c010 (Loongson-64bit, Loongson-3A5000)\n Modules linked in: bpf_testmod(OE) [last unloaded: bpf_testmod(OE)]\n Process test_progs (pid: 449, threadinfo=000000009af02b3a, task=00000000e9ba4956)\n Stack : 0000000000000000 90000001075bc8ac 90000000869524a8 9000000100741ce8\n 90000001075bc800 9000000100415300 90000001075bc8ac 0000000000000000\n 900000010597c400 900000008694a000 0000000000000000 9000000105b59000\n 90000001075bc800 9000000100741ce8 0000000000000050 900000008513000c\n 9000000086936000 0000000100094d4c fffffff400676208 0000000000000000\n 9000000105b59000 900000008694a000 9000000086bf0dc0 9000000105b59000\n 9000000086bf0d68 9000000085147010 90000001075be788 0000000000000000\n 9000000086bf0f98 0000000000000001 0000000000000010 9000000006015840\n 0000000000000000 9000000086be6c40 0000000000000000 0000000000000000\n 0000000000000000 4f2317da8a7e08c4 0000000000000101 4f2317da8a7e08c4\n ...\n Call Trace:\n [\u003c90000000851b5ac0\u003e] __qdisc_run+0xc8/0x8d8\n [\u003c9000000085130008\u003e] __dev_queue_xmit+0x578/0x10f0\n [\u003c90000000853701c0\u003e] ip6_finish_output2+0x2f0/0x950\n [\u003c9000000085374bc8\u003e] ip6_finish_output+0x2b8/0x448\n [\u003c9000000085370b24\u003e] ip6_xmit+0x304/0x858\n [\u003c90000000853c4438\u003e] inet6_csk_xmit+0x100/0x170\n [\u003c90000000852b32f0\u003e] __tcp_transmit_skb+0x490/0xdd0\n [\u003c90000000852b47fc\u003e] tcp_connect+0xbcc/0x1168\n [\u003c90000000853b9088\u003e] tcp_v6_connect+0x580/0x8a0\n [\u003c90000000852e7738\u003e] __inet_stream_connect+0x170/0x480\n [\u003c90000000852e7a98\u003e] inet_stream_connect+0x50/0x88\n [\u003c90000000850f2814\u003e] __sys_connect+0xe4/0x110\n [\u003c90000000850f2858\u003e] sys_connect+0x18/0x28\n [\u003c9000000085520c94\u003e] do_syscall+0x94/0x1a0\n [\u003c9000000083df1fb8\u003e] handle_syscall+0xb8/0x158\n\n Code: 4001ad80 2400873f 2400832d \u003c240073cc\u003e 001137ff 001133ff 6407b41f 001503cc 0280041d\n\n ---[ end trace 0000000000000000 ]---\n\nThe bpf_fifo_dequeue prog returns a skb which is a pointer. The pointer\nis treated as a 32bit value and sign extend to 64bit in epilogue. This\nbehavior is right for most bpf prog types but wrong for struct ops which\nrequires LoongArch ABI.\n\nSo let\u0027s sign extend struct ops return values according to the LoongArch\nABI ([1]) and return value spec in function model.\n\n[1]: https://loongson.github.io/LoongArch-Documentation/LoongArch-ELF-ABI-EN.html",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40041",
"url": "https://www.suse.com/security/cve/CVE-2025-40041"
},
{
"category": "external",
"summary": "SUSE Bug 1252860 for CVE-2025-40041",
"url": "https://bugzilla.suse.com/1252860"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40041"
},
{
"cve": "CVE-2025-40042",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40042"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntracing: Fix race condition in kprobe initialization causing NULL pointer dereference\n\nThere is a critical race condition in kprobe initialization that can lead to\nNULL pointer dereference and kernel crash.\n\n[1135630.084782] Unable to handle kernel paging request at virtual address 0000710a04630000\n...\n[1135630.260314] pstate: 404003c9 (nZcv DAIF +PAN -UAO)\n[1135630.269239] pc : kprobe_perf_func+0x30/0x260\n[1135630.277643] lr : kprobe_dispatcher+0x44/0x60\n[1135630.286041] sp : ffffaeff4977fa40\n[1135630.293441] x29: ffffaeff4977fa40 x28: ffffaf015340e400\n[1135630.302837] x27: 0000000000000000 x26: 0000000000000000\n[1135630.312257] x25: ffffaf029ed108a8 x24: ffffaf015340e528\n[1135630.321705] x23: ffffaeff4977fc50 x22: ffffaeff4977fc50\n[1135630.331154] x21: 0000000000000000 x20: ffffaeff4977fc50\n[1135630.340586] x19: ffffaf015340e400 x18: 0000000000000000\n[1135630.349985] x17: 0000000000000000 x16: 0000000000000000\n[1135630.359285] x15: 0000000000000000 x14: 0000000000000000\n[1135630.368445] x13: 0000000000000000 x12: 0000000000000000\n[1135630.377473] x11: 0000000000000000 x10: 0000000000000000\n[1135630.386411] x9 : 0000000000000000 x8 : 0000000000000000\n[1135630.395252] x7 : 0000000000000000 x6 : 0000000000000000\n[1135630.403963] x5 : 0000000000000000 x4 : 0000000000000000\n[1135630.412545] x3 : 0000710a04630000 x2 : 0000000000000006\n[1135630.421021] x1 : ffffaeff4977fc50 x0 : 0000710a04630000\n[1135630.429410] Call trace:\n[1135630.434828] kprobe_perf_func+0x30/0x260\n[1135630.441661] kprobe_dispatcher+0x44/0x60\n[1135630.448396] aggr_pre_handler+0x70/0xc8\n[1135630.454959] kprobe_breakpoint_handler+0x140/0x1e0\n[1135630.462435] brk_handler+0xbc/0xd8\n[1135630.468437] do_debug_exception+0x84/0x138\n[1135630.475074] el1_dbg+0x18/0x8c\n[1135630.480582] security_file_permission+0x0/0xd0\n[1135630.487426] vfs_write+0x70/0x1c0\n[1135630.493059] ksys_write+0x5c/0xc8\n[1135630.498638] __arm64_sys_write+0x24/0x30\n[1135630.504821] el0_svc_common+0x78/0x130\n[1135630.510838] el0_svc_handler+0x38/0x78\n[1135630.516834] el0_svc+0x8/0x1b0\n\nkernel/trace/trace_kprobe.c: 1308\n0xffff3df8995039ec \u003ckprobe_perf_func+0x2c\u003e: ldr x21, [x24,#120]\ninclude/linux/compiler.h: 294\n0xffff3df8995039f0 \u003ckprobe_perf_func+0x30\u003e: ldr x1, [x21,x0]\n\nkernel/trace/trace_kprobe.c\n1308: head = this_cpu_ptr(call-\u003eperf_events);\n1309: if (hlist_empty(head))\n1310: \treturn 0;\n\ncrash\u003e struct trace_event_call -o\nstruct trace_event_call {\n ...\n [120] struct hlist_head *perf_events; //(call-\u003eperf_event)\n ...\n}\n\ncrash\u003e struct trace_event_call ffffaf015340e528\nstruct trace_event_call {\n ...\n perf_events = 0xffff0ad5fa89f088, //this value is correct, but x21 = 0\n ...\n}\n\nRace Condition Analysis:\n\nThe race occurs between kprobe activation and perf_events initialization:\n\n CPU0 CPU1\n ==== ====\n perf_kprobe_init\n perf_trace_event_init\n tp_event-\u003eperf_events = list;(1)\n tp_event-\u003eclass-\u003ereg (2)\u003c- KPROBE ACTIVE\n Debug exception triggers\n ...\n kprobe_dispatcher\n kprobe_perf_func (tk-\u003etp.flags \u0026 TP_FLAG_PROFILE)\n head = this_cpu_ptr(call-\u003eperf_events)(3)\n (perf_events is still NULL)\n\nProblem:\n1. CPU0 executes (1) assigning tp_event-\u003eperf_events = list\n2. CPU0 executes (2) enabling kprobe functionality via class-\u003ereg()\n3. CPU1 triggers and reaches kprobe_dispatcher\n4. CPU1 checks TP_FLAG_PROFILE - condition passes (step 2 completed)\n5. CPU1 calls kprobe_perf_func() and crashes at (3) because\n call-\u003eperf_events is still NULL\n\nCPU1 sees that kprobe functionality is enabled but does not see that\nperf_events has been assigned.\n\nAdd pairing read an\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40042",
"url": "https://www.suse.com/security/cve/CVE-2025-40042"
},
{
"category": "external",
"summary": "SUSE Bug 1252861 for CVE-2025-40042",
"url": "https://bugzilla.suse.com/1252861"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40042"
},
{
"cve": "CVE-2025-40043",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40043"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: nfc: nci: Add parameter validation for packet data\n\nSyzbot reported an uninitialized value bug in nci_init_req, which was\nintroduced by commit 5aca7966d2a7 (\"Merge tag\n\u0027perf-tools-fixes-for-v6.17-2025-09-16\u0027 of\ngit://git.kernel.org/pub/scm/linux/kernel/git/perf/perf-tools\").\n\nThis bug arises due to very limited and poor input validation\nthat was done at nic_valid_size(). This validation only\nvalidates the skb-\u003elen (directly reflects size provided at the\nuserspace interface) with the length provided in the buffer\nitself (interpreted as NCI_HEADER). This leads to the processing\nof memory content at the address assuming the correct layout\nper what opcode requires there. This leads to the accesses to\nbuffer of `skb_buff-\u003edata` which is not assigned anything yet.\n\nFollowing the same silent drop of packets of invalid sizes at\n`nic_valid_size()`, add validation of the data in the respective\nhandlers and return error values in case of failure. Release\nthe skb if error values are returned from handlers in\n`nci_nft_packet` and effectively do a silent drop\n\nPossible TODO: because we silently drop the packets, the\ncall to `nci_request` will be waiting for completion of request\nand will face timeouts. These timeouts can get excessively logged\nin the dmesg. A proper handling of them may require to export\n`nci_request_cancel` (or propagate error handling from the\nnft packets handlers).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40043",
"url": "https://www.suse.com/security/cve/CVE-2025-40043"
},
{
"category": "external",
"summary": "SUSE Bug 1252787 for CVE-2025-40043",
"url": "https://bugzilla.suse.com/1252787"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40043"
},
{
"cve": "CVE-2025-40044",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40044"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs: udf: fix OOB read in lengthAllocDescs handling\n\nWhen parsing Allocation Extent Descriptor, lengthAllocDescs comes from\non-disk data and must be validated against the block size. Crafted or\ncorrupted images may set lengthAllocDescs so that the total descriptor\nlength (sizeof(allocExtDesc) + lengthAllocDescs) exceeds the buffer,\nleading udf_update_tag() to call crc_itu_t() on out-of-bounds memory and\ntrigger a KASAN use-after-free read.\n\nBUG: KASAN: use-after-free in crc_itu_t+0x1d5/0x2b0 lib/crc-itu-t.c:60\nRead of size 1 at addr ffff888041e7d000 by task syz-executor317/5309\n\nCPU: 0 UID: 0 PID: 5309 Comm: syz-executor317 Not tainted 6.12.0-rc4-syzkaller-00261-g850925a8133c #0\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014\nCall Trace:\n \u003cTASK\u003e\n __dump_stack lib/dump_stack.c:94 [inline]\n dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:377 [inline]\n print_report+0x169/0x550 mm/kasan/report.c:488\n kasan_report+0x143/0x180 mm/kasan/report.c:601\n crc_itu_t+0x1d5/0x2b0 lib/crc-itu-t.c:60\n udf_update_tag+0x70/0x6a0 fs/udf/misc.c:261\n udf_write_aext+0x4d8/0x7b0 fs/udf/inode.c:2179\n extent_trunc+0x2f7/0x4a0 fs/udf/truncate.c:46\n udf_truncate_tail_extent+0x527/0x7e0 fs/udf/truncate.c:106\n udf_release_file+0xc1/0x120 fs/udf/file.c:185\n __fput+0x23f/0x880 fs/file_table.c:431\n task_work_run+0x24f/0x310 kernel/task_work.c:239\n exit_task_work include/linux/task_work.h:43 [inline]\n do_exit+0xa2f/0x28e0 kernel/exit.c:939\n do_group_exit+0x207/0x2c0 kernel/exit.c:1088\n __do_sys_exit_group kernel/exit.c:1099 [inline]\n __se_sys_exit_group kernel/exit.c:1097 [inline]\n __x64_sys_exit_group+0x3f/0x40 kernel/exit.c:1097\n x64_sys_call+0x2634/0x2640 arch/x86/include/generated/asm/syscalls_64.h:232\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n \u003c/TASK\u003e\n\nValidate the computed total length against epos-\u003ebh-\u003eb_size.\n\nFound by Linux Verification Center (linuxtesting.org) with Syzkaller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40044",
"url": "https://www.suse.com/security/cve/CVE-2025-40044"
},
{
"category": "external",
"summary": "SUSE Bug 1252785 for CVE-2025-40044",
"url": "https://bugzilla.suse.com/1252785"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40044"
},
{
"cve": "CVE-2025-40045",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40045"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: codecs: wcd937x: set the comp soundwire port correctly\n\nFor some reason we endup with setting soundwire port for\nHPHL_COMP and HPHR_COMP as zero, this can potentially result\nin a memory corruption due to accessing and setting -1 th element of\nport_map array.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40045",
"url": "https://www.suse.com/security/cve/CVE-2025-40045"
},
{
"category": "external",
"summary": "SUSE Bug 1252784 for CVE-2025-40045",
"url": "https://bugzilla.suse.com/1252784"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40045"
},
{
"cve": "CVE-2025-40046",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40046"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring/zcrx: fix overshooting recv limit\n\nIt\u0027s reported that sometimes a zcrx request can receive more than was\nrequested. It\u0027s caused by io_zcrx_recv_skb() adjusting desc-\u003ecount for\nall received buffers including frag lists, but then doing recursive\ncalls to process frag list skbs, which leads to desc-\u003ecount double\naccounting and underflow.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40046",
"url": "https://www.suse.com/security/cve/CVE-2025-40046"
},
{
"category": "external",
"summary": "SUSE Bug 1252791 for CVE-2025-40046",
"url": "https://bugzilla.suse.com/1252791"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40046"
},
{
"cve": "CVE-2025-40047",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40047"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring/waitid: always prune wait queue entry in io_waitid_wait()\n\nFor a successful return, always remove our entry from the wait queue\nentry list. Previously this was skipped if a cancelation was in\nprogress, but this can race with another invocation of the wait queue\nentry callback.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40047",
"url": "https://www.suse.com/security/cve/CVE-2025-40047"
},
{
"category": "external",
"summary": "SUSE Bug 1252790 for CVE-2025-40047",
"url": "https://bugzilla.suse.com/1252790"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40047"
},
{
"cve": "CVE-2025-40048",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40048"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nuio_hv_generic: Let userspace take care of interrupt mask\n\nRemove the logic to set interrupt mask by default in uio_hv_generic\ndriver as the interrupt mask value is supposed to be controlled\ncompletely by the user space. If the mask bit gets changed\nby the driver, concurrently with user mode operating on the ring,\nthe mask bit may be set when it is supposed to be clear, and the\nuser-mode driver will miss an interrupt which will cause a hang.\n\nFor eg- when the driver sets inbound ring buffer interrupt mask to 1,\nthe host does not interrupt the guest on the UIO VMBus channel.\nHowever, setting the mask does not prevent the host from putting a\nmessage in the inbound ring buffer. So let\u0027s assume that happens,\nthe host puts a message into the ring buffer but does not interrupt.\n\nSubsequently, the user space code in the guest sets the inbound ring\nbuffer interrupt mask to 0, saying \u201cHey, I\u0027m ready for interrupts\u201d.\nUser space code then calls pread() to wait for an interrupt.\nThen one of two things happens:\n\n* The host never sends another message. So the pread() waits forever.\n* The host does send another message. But because there\u0027s already a\n message in the ring buffer, it doesn\u0027t generate an interrupt.\n This is the correct behavior, because the host should only send an\n interrupt when the inbound ring buffer transitions from empty to\n not-empty. Adding an additional message to a ring buffer that is not\n empty is not supposed to generate an interrupt on the guest.\n Since the guest is waiting in pread() and not removing messages from\n the ring buffer, the pread() waits forever.\n\nThis could be easily reproduced in hv_fcopy_uio_daemon if we delay\nsetting interrupt mask to 0.\n\nSimilarly if hv_uio_channel_cb() sets the interrupt_mask to 1,\nthere\u0027s a race condition. Once user space empties the inbound ring\nbuffer, but before user space sets interrupt_mask to 0, the host could\nput another message in the ring buffer but it wouldn\u0027t interrupt.\nThen the next pread() would hang.\n\nFix these by removing all instances where interrupt_mask is changed,\nwhile keeping the one in set_event() unchanged to enable userspace\ncontrol the interrupt mask by writing 0/1 to /dev/uioX.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40048",
"url": "https://www.suse.com/security/cve/CVE-2025-40048"
},
{
"category": "external",
"summary": "SUSE Bug 1252862 for CVE-2025-40048",
"url": "https://bugzilla.suse.com/1252862"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40048"
},
{
"cve": "CVE-2025-40049",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40049"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nSquashfs: fix uninit-value in squashfs_get_parent\n\nSyzkaller reports a \"KMSAN: uninit-value in squashfs_get_parent\" bug.\n\nThis is caused by open_by_handle_at() being called with a file handle\ncontaining an invalid parent inode number. In particular the inode number\nis that of a symbolic link, rather than a directory.\n\nSquashfs_get_parent() gets called with that symbolic link inode, and\naccesses the parent member field.\n\n\tunsigned int parent_ino = squashfs_i(inode)-\u003eparent;\n\nBecause non-directory inodes in Squashfs do not have a parent value, this\nis uninitialised, and this causes an uninitialised value access.\n\nThe fix is to initialise parent with the invalid inode 0, which will cause\nan EINVAL error to be returned.\n\nRegular inodes used to share the parent field with the block_list_start\nfield. This is removed in this commit to enable the parent field to\ncontain the invalid inode number 0.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40049",
"url": "https://www.suse.com/security/cve/CVE-2025-40049"
},
{
"category": "external",
"summary": "SUSE Bug 1252822 for CVE-2025-40049",
"url": "https://bugzilla.suse.com/1252822"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40049"
},
{
"cve": "CVE-2025-40050",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40050"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Skip scalar adjustment for BPF_NEG if dst is a pointer\n\nIn check_alu_op(), the verifier currently calls check_reg_arg() and\nadjust_scalar_min_max_vals() unconditionally for BPF_NEG operations.\nHowever, if the destination register holds a pointer, these scalar\nadjustments are unnecessary and potentially incorrect.\n\nThis patch adds a check to skip the adjustment logic when the destination\nregister contains a pointer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40050",
"url": "https://www.suse.com/security/cve/CVE-2025-40050"
},
{
"category": "external",
"summary": "SUSE Bug 1252856 for CVE-2025-40050",
"url": "https://bugzilla.suse.com/1252856"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40050"
},
{
"cve": "CVE-2025-40051",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40051"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvhost: vringh: Modify the return value check\n\nThe return value of copy_from_iter and copy_to_iter can\u0027t be negative,\ncheck whether the copied lengths are equal.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40051",
"url": "https://www.suse.com/security/cve/CVE-2025-40051"
},
{
"category": "external",
"summary": "SUSE Bug 1252858 for CVE-2025-40051",
"url": "https://bugzilla.suse.com/1252858"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40051"
},
{
"cve": "CVE-2025-40052",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40052"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: fix crypto buffers in non-linear memory\n\nThe crypto API, through the scatterlist API, expects input buffers to be\nin linear memory. We handle this with the cifs_sg_set_buf() helper\nthat converts vmalloc\u0027d memory to their corresponding pages.\n\nHowever, when we allocate our aead_request buffer (@creq in\nsmb2ops.c::crypt_message()), we do so with kvzalloc(), which possibly\nputs aead_request-\u003e__ctx in vmalloc area.\n\nAEAD algorithm then uses -\u003e__ctx for its private/internal data and\noperations, and uses sg_set_buf() for such data on a few places.\n\nThis works fine as long as @creq falls into kmalloc zone (small\nrequests) or vmalloc\u0027d memory is still within linear range.\n\nTasks\u0027 stacks are vmalloc\u0027d by default (CONFIG_VMAP_STACK=y), so too\nmany tasks will increment the base stacks\u0027 addresses to a point where\nvirt_addr_valid(buf) will fail (BUG() in sg_set_buf()) when that\nhappens.\n\nIn practice: too many parallel reads and writes on an encrypted mount\nwill trigger this bug.\n\nTo fix this, always alloc @creq with kmalloc() instead.\nAlso drop the @sensitive_size variable/arguments since\nkfree_sensitive() doesn\u0027t need it.\n\nBacktrace:\n\n[ 945.272081] ------------[ cut here ]------------\n[ 945.272774] kernel BUG at include/linux/scatterlist.h:209!\n[ 945.273520] Oops: invalid opcode: 0000 [#1] SMP DEBUG_PAGEALLOC NOPTI\n[ 945.274412] CPU: 7 UID: 0 PID: 56 Comm: kworker/u33:0 Kdump: loaded Not tainted 6.15.0-lku-11779-g8e9d6efccdd7-dirty #1 PREEMPT(voluntary)\n[ 945.275736] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.16.3-2-gc13ff2cd-prebuilt.qemu.org 04/01/2014\n[ 945.276877] Workqueue: writeback wb_workfn (flush-cifs-2)\n[ 945.277457] RIP: 0010:crypto_gcm_init_common+0x1f9/0x220\n[ 945.278018] Code: b0 00 00 00 48 83 c4 08 5b 5d 41 5c 41 5d 41 5e 41 5f c3 cc cc cc cc 48 c7 c0 00 00 00 80 48 2b 05 5c 58 e5 00 e9 58 ff ff ff \u003c0f\u003e 0b 0f 0b 0f 0b 0f 0b 0f 0b 0f 0b 48 c7 04 24 01 00 00 00 48 8b\n[ 945.279992] RSP: 0018:ffffc90000a27360 EFLAGS: 00010246\n[ 945.280578] RAX: 0000000000000000 RBX: ffffc90001d85060 RCX: 0000000000000030\n[ 945.281376] RDX: 0000000000080000 RSI: 0000000000000000 RDI: ffffc90081d85070\n[ 945.282145] RBP: ffffc90001d85010 R08: ffffc90001d85000 R09: 0000000000000000\n[ 945.282898] R10: ffffc90001d85090 R11: 0000000000001000 R12: ffffc90001d85070\n[ 945.283656] R13: ffff888113522948 R14: ffffc90001d85060 R15: ffffc90001d85010\n[ 945.284407] FS: 0000000000000000(0000) GS:ffff8882e66cf000(0000) knlGS:0000000000000000\n[ 945.285262] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 945.285884] CR2: 00007fa7ffdd31f4 CR3: 000000010540d000 CR4: 0000000000350ef0\n[ 945.286683] Call Trace:\n[ 945.286952] \u003cTASK\u003e\n[ 945.287184] ? crypt_message+0x33f/0xad0 [cifs]\n[ 945.287719] crypto_gcm_encrypt+0x36/0xe0\n[ 945.288152] crypt_message+0x54a/0xad0 [cifs]\n[ 945.288724] smb3_init_transform_rq+0x277/0x300 [cifs]\n[ 945.289300] smb_send_rqst+0xa3/0x160 [cifs]\n[ 945.289944] cifs_call_async+0x178/0x340 [cifs]\n[ 945.290514] ? __pfx_smb2_writev_callback+0x10/0x10 [cifs]\n[ 945.291177] smb2_async_writev+0x3e3/0x670 [cifs]\n[ 945.291759] ? find_held_lock+0x32/0x90\n[ 945.292212] ? netfs_advance_write+0xf2/0x310\n[ 945.292723] netfs_advance_write+0xf2/0x310\n[ 945.293210] netfs_write_folio+0x346/0xcc0\n[ 945.293689] ? __pfx__raw_spin_unlock_irq+0x10/0x10\n[ 945.294250] netfs_writepages+0x117/0x460\n[ 945.294724] do_writepages+0xbe/0x170\n[ 945.295152] ? find_held_lock+0x32/0x90\n[ 945.295600] ? kvm_sched_clock_read+0x11/0x20\n[ 945.296103] __writeback_single_inode+0x56/0x4b0\n[ 945.296643] writeback_sb_inodes+0x229/0x550\n[ 945.297140] __writeback_inodes_wb+0x4c/0xe0\n[ 945.297642] wb_writeback+0x2f1/0x3f0\n[ 945.298069] wb_workfn+0x300/0x490\n[ 945.298472] process_one_work+0x1fe/0x590\n[ 945.298949] worker_thread+0x1ce/0x3c0\n[ 945.299397] ? __pfx_worker_thread+0x10/0x10\n[ 945.299900] kthr\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40052",
"url": "https://www.suse.com/security/cve/CVE-2025-40052"
},
{
"category": "external",
"summary": "SUSE Bug 1252851 for CVE-2025-40052",
"url": "https://bugzilla.suse.com/1252851"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40052"
},
{
"cve": "CVE-2025-40053",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40053"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: dlink: handle copy_thresh allocation failure\n\nThe driver did not handle failure of `netdev_alloc_skb_ip_align()`.\nIf the allocation failed, dereferencing `skb-\u003eprotocol` could lead to\na NULL pointer dereference.\n\nThis patch tries to allocate `skb`. If the allocation fails, it falls\nback to the normal path.\n\nTested-on: D-Link DGE-550T Rev-A3",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40053",
"url": "https://www.suse.com/security/cve/CVE-2025-40053"
},
{
"category": "external",
"summary": "SUSE Bug 1252808 for CVE-2025-40053",
"url": "https://bugzilla.suse.com/1252808"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40053"
},
{
"cve": "CVE-2025-40054",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40054"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nf2fs: fix UAF issue in f2fs_merge_page_bio()\n\nAs JY reported in bugzilla [1],\n\nUnable to handle kernel NULL pointer dereference at virtual address 0000000000000000\npc : [0xffffffe51d249484] f2fs_is_cp_guaranteed+0x70/0x98\nlr : [0xffffffe51d24adbc] f2fs_merge_page_bio+0x520/0x6d4\nCPU: 3 UID: 0 PID: 6790 Comm: kworker/u16:3 Tainted: P B W OE 6.12.30-android16-5-maybe-dirty-4k #1 5f7701c9cbf727d1eebe77c89bbbeb3371e895e5\nTainted: [P]=PROPRIETARY_MODULE, [B]=BAD_PAGE, [W]=WARN, [O]=OOT_MODULE, [E]=UNSIGNED_MODULE\nWorkqueue: writeback wb_workfn (flush-254:49)\nCall trace:\n f2fs_is_cp_guaranteed+0x70/0x98\n f2fs_inplace_write_data+0x174/0x2f4\n f2fs_do_write_data_page+0x214/0x81c\n f2fs_write_single_data_page+0x28c/0x764\n f2fs_write_data_pages+0x78c/0xce4\n do_writepages+0xe8/0x2fc\n __writeback_single_inode+0x4c/0x4b4\n writeback_sb_inodes+0x314/0x540\n __writeback_inodes_wb+0xa4/0xf4\n wb_writeback+0x160/0x448\n wb_workfn+0x2f0/0x5dc\n process_scheduled_works+0x1c8/0x458\n worker_thread+0x334/0x3f0\n kthread+0x118/0x1ac\n ret_from_fork+0x10/0x20\n\n[1] https://bugzilla.kernel.org/show_bug.cgi?id=220575\n\nThe panic was caused by UAF issue w/ below race condition:\n\nkworker\n- writepages\n - f2fs_write_cache_pages\n - f2fs_write_single_data_page\n - f2fs_do_write_data_page\n - f2fs_inplace_write_data\n - f2fs_merge_page_bio\n - add_inu_page\n : cache page #1 into bio \u0026 cache bio in\n io-\u003ebio_list\n - f2fs_write_single_data_page\n - f2fs_do_write_data_page\n - f2fs_inplace_write_data\n - f2fs_merge_page_bio\n - add_inu_page\n : cache page #2 into bio which is linked\n in io-\u003ebio_list\n\t\t\t\t\t\twrite\n\t\t\t\t\t\t- f2fs_write_begin\n\t\t\t\t\t\t: write page #1\n\t\t\t\t\t\t - f2fs_folio_wait_writeback\n\t\t\t\t\t\t - f2fs_submit_merged_ipu_write\n\t\t\t\t\t\t - f2fs_submit_write_bio\n\t\t\t\t\t\t : submit bio which inclues page #1 and #2\n\n\t\t\t\t\t\tsoftware IRQ\n\t\t\t\t\t\t- f2fs_write_end_io\n\t\t\t\t\t\t - fscrypt_free_bounce_page\n\t\t\t\t\t\t : freed bounced page which belongs to page #2\n - inc_page_count( , WB_DATA_TYPE(data_folio), false)\n : data_folio points to fio-\u003eencrypted_page\n the bounced page can be freed before\n accessing it in f2fs_is_cp_guarantee()\n\nIt can reproduce w/ below testcase:\nRun below script in shell #1:\nfor ((i=1;i\u003e0;i++)) do xfs_io -f /mnt/f2fs/enc/file \\\n-c \"pwrite 0 32k\" -c \"fdatasync\"\n\nRun below script in shell #2:\nfor ((i=1;i\u003e0;i++)) do xfs_io -f /mnt/f2fs/enc/file \\\n-c \"pwrite 0 32k\" -c \"fdatasync\"\n\nSo, in f2fs_merge_page_bio(), let\u0027s avoid using fio-\u003eencrypted_page after\ncommit page into internal ipu cache.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40054",
"url": "https://www.suse.com/security/cve/CVE-2025-40054"
},
{
"category": "external",
"summary": "SUSE Bug 1252853 for CVE-2025-40054",
"url": "https://bugzilla.suse.com/1252853"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40054"
},
{
"cve": "CVE-2025-40055",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40055"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocfs2: fix double free in user_cluster_connect()\n\nuser_cluster_disconnect() frees \"conn-\u003ecc_private\" which is \"lc\" but then\nthe error handling frees \"lc\" a second time. Set \"lc\" to NULL on this\npath to avoid a double free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40055",
"url": "https://www.suse.com/security/cve/CVE-2025-40055"
},
{
"category": "external",
"summary": "SUSE Bug 1252821 for CVE-2025-40055",
"url": "https://bugzilla.suse.com/1252821"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40055"
},
{
"cve": "CVE-2025-40056",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40056"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvhost: vringh: Fix copy_to_iter return value check\n\nThe return value of copy_to_iter can\u0027t be negative, check whether the\ncopied length is equal to the requested length instead of checking for\nnegative values.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40056",
"url": "https://www.suse.com/security/cve/CVE-2025-40056"
},
{
"category": "external",
"summary": "SUSE Bug 1252826 for CVE-2025-40056",
"url": "https://bugzilla.suse.com/1252826"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40056"
},
{
"cve": "CVE-2025-40057",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40057"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nptp: Add a upper bound on max_vclocks\n\nsyzbot reported WARNING in max_vclocks_store.\n\nThis occurs when the argument max is too large for kcalloc to handle.\n\nExtend the guard to guard against values that are too large for\nkcalloc",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40057",
"url": "https://www.suse.com/security/cve/CVE-2025-40057"
},
{
"category": "external",
"summary": "SUSE Bug 1252825 for CVE-2025-40057",
"url": "https://bugzilla.suse.com/1252825"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40057"
},
{
"cve": "CVE-2025-40058",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40058"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\niommu/vt-d: Disallow dirty tracking if incoherent page walk\n\nDirty page tracking relies on the IOMMU atomically updating the dirty bit\nin the paging-structure entry. For this operation to succeed, the paging-\nstructure memory must be coherent between the IOMMU and the CPU. In\nanother word, if the iommu page walk is incoherent, dirty page tracking\ndoesn\u0027t work.\n\nThe Intel VT-d specification, Section 3.10 \"Snoop Behavior\" states:\n\n\"Remapping hardware encountering the need to atomically update A/EA/D bits\n in a paging-structure entry that is not snooped will result in a non-\n recoverable fault.\"\n\nTo prevent an IOMMU from being incorrectly configured for dirty page\ntracking when it is operating in an incoherent mode, mark SSADS as\nsupported only when both ecap_slads and ecap_smpwc are supported.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40058",
"url": "https://www.suse.com/security/cve/CVE-2025-40058"
},
{
"category": "external",
"summary": "SUSE Bug 1252854 for CVE-2025-40058",
"url": "https://bugzilla.suse.com/1252854"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40058"
},
{
"cve": "CVE-2025-40059",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40059"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncoresight: Fix incorrect handling for return value of devm_kzalloc\n\nThe return value of devm_kzalloc could be an null pointer,\nuse \"!desc.pdata\" to fix incorrect handling return value\nof devm_kzalloc.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40059",
"url": "https://www.suse.com/security/cve/CVE-2025-40059"
},
{
"category": "external",
"summary": "SUSE Bug 1252809 for CVE-2025-40059",
"url": "https://bugzilla.suse.com/1252809"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40059"
},
{
"cve": "CVE-2025-40060",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40060"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncoresight: trbe: Return NULL pointer for allocation failures\n\nWhen the TRBE driver fails to allocate a buffer, it currently returns\nthe error code \"-ENOMEM\". However, the caller etm_setup_aux() only\nchecks for a NULL pointer, so it misses the error. As a result, the\ndriver continues and eventually causes a kernel panic.\n\nFix this by returning a NULL pointer from arm_trbe_alloc_buffer() on\nallocation failures. This allows that the callers can properly handle\nthe failure.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40060",
"url": "https://www.suse.com/security/cve/CVE-2025-40060"
},
{
"category": "external",
"summary": "SUSE Bug 1252848 for CVE-2025-40060",
"url": "https://bugzilla.suse.com/1252848"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40060"
},
{
"cve": "CVE-2025-40061",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40061"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/rxe: Fix race in do_task() when draining\n\nWhen do_task() exhausts its iteration budget (!ret), it sets the state\nto TASK_STATE_IDLE to reschedule, without a secondary check on the\ncurrent task-\u003estate. This can overwrite the TASK_STATE_DRAINING state\nset by a concurrent call to rxe_cleanup_task() or rxe_disable_task().\n\nWhile state changes are protected by a spinlock, both rxe_cleanup_task()\nand rxe_disable_task() release the lock while waiting for the task to\nfinish draining in the while(!is_done(task)) loop. The race occurs if\ndo_task() hits its iteration limit and acquires the lock in this window.\nThe cleanup logic may then proceed while the task incorrectly\nreschedules itself, leading to a potential use-after-free.\n\nThis bug was introduced during the migration from tasklets to workqueues,\nwhere the special handling for the draining case was lost.\n\nFix this by restoring the original pre-migration behavior. If the state is\nTASK_STATE_DRAINING when iterations are exhausted, set cont to 1 to\nforce a new loop iteration. This allows the task to finish its work, so\nthat a subsequent iteration can reach the switch statement and correctly\ntransition the state to TASK_STATE_DRAINED, stopping the task as intended.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40061",
"url": "https://www.suse.com/security/cve/CVE-2025-40061"
},
{
"category": "external",
"summary": "SUSE Bug 1252849 for CVE-2025-40061",
"url": "https://bugzilla.suse.com/1252849"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40061"
},
{
"cve": "CVE-2025-40062",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40062"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: hisilicon/qm - set NULL to qm-\u003edebug.qm_diff_regs\n\nWhen the initialization of qm-\u003edebug.acc_diff_reg fails,\nthe probe process does not exit. However, after qm-\u003edebug.qm_diff_regs is\nfreed, it is not set to NULL. This can lead to a double free when the\nremove process attempts to free it again. Therefore, qm-\u003edebug.qm_diff_regs\nshould be set to NULL after it is freed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40062",
"url": "https://www.suse.com/security/cve/CVE-2025-40062"
},
{
"category": "external",
"summary": "SUSE Bug 1252850 for CVE-2025-40062",
"url": "https://bugzilla.suse.com/1252850"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40062"
},
{
"cve": "CVE-2025-40063",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40063"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: comp - Use same definition of context alloc and free ops\n\nIn commit 42d9f6c77479 (\"crypto: acomp - Move scomp stream allocation\ncode into acomp\"), the crypto_acomp_streams struct was made to rely on\nhaving the alloc_ctx and free_ctx operations defined in the same order\nas the scomp_alg struct. But in that same commit, the alloc_ctx and\nfree_ctx members of scomp_alg may be randomized by structure layout\nrandomization, since they are contained in a pure ops structure\n(containing only function pointers). If the pointers within scomp_alg\nare randomized, but those in crypto_acomp_streams are not, then\nthe order may no longer match. This fixes the problem by removing the\nunion from scomp_alg so that both crypto_acomp_streams and scomp_alg\nwill share the same definition of alloc_ctx and free_ctx, ensuring\nthey will always have the same layout.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40063",
"url": "https://www.suse.com/security/cve/CVE-2025-40063"
},
{
"category": "external",
"summary": "SUSE Bug 1252844 for CVE-2025-40063",
"url": "https://bugzilla.suse.com/1252844"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40063"
},
{
"cve": "CVE-2025-40064",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40064"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Fix use-after-free in __pnet_find_base_ndev().\n\nsyzbot reported use-after-free of net_device in __pnet_find_base_ndev(),\nwhich was called during connect(). [0]\n\nsmc_pnet_find_ism_resource() fetches sk_dst_get(sk)-\u003edev and passes\ndown to pnet_find_base_ndev(), where RTNL is held. Then, UAF happened\nat __pnet_find_base_ndev() when the dev is first used.\n\nThis means dev had already been freed before acquiring RTNL in\npnet_find_base_ndev().\n\nWhile dev is going away, dst-\u003edev could be swapped with blackhole_netdev,\nand the dev\u0027s refcnt by dst will be released.\n\nWe must hold dev\u0027s refcnt before calling smc_pnet_find_ism_resource().\n\nAlso, smc_pnet_find_roce_resource() has the same problem.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu() in the two functions.\n\n[0]:\nBUG: KASAN: use-after-free in __pnet_find_base_ndev+0x1b1/0x1c0 net/smc/smc_pnet.c:926\nRead of size 1 at addr ffff888036bac33a by task syz.0.3632/18609\n\nCPU: 1 UID: 0 PID: 18609 Comm: syz.0.3632 Not tainted syzkaller #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025\nCall Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:378 [inline]\n print_report+0xca/0x240 mm/kasan/report.c:482\n kasan_report+0x118/0x150 mm/kasan/report.c:595\n __pnet_find_base_ndev+0x1b1/0x1c0 net/smc/smc_pnet.c:926\n pnet_find_base_ndev net/smc/smc_pnet.c:946 [inline]\n smc_pnet_find_ism_by_pnetid net/smc/smc_pnet.c:1103 [inline]\n smc_pnet_find_ism_resource+0xef/0x390 net/smc/smc_pnet.c:1154\n smc_find_ism_device net/smc/af_smc.c:1030 [inline]\n smc_find_proposal_devices net/smc/af_smc.c:1115 [inline]\n __smc_connect+0x372/0x1890 net/smc/af_smc.c:1545\n smc_connect+0x877/0xd90 net/smc/af_smc.c:1715\n __sys_connect_file net/socket.c:2086 [inline]\n __sys_connect+0x313/0x440 net/socket.c:2105\n __do_sys_connect net/socket.c:2111 [inline]\n __se_sys_connect net/socket.c:2108 [inline]\n __x64_sys_connect+0x7a/0x90 net/socket.c:2108\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7f47cbf8eba9\nCode: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007f47ccdb1038 EFLAGS: 00000246 ORIG_RAX: 000000000000002a\nRAX: ffffffffffffffda RBX: 00007f47cc1d5fa0 RCX: 00007f47cbf8eba9\nRDX: 0000000000000010 RSI: 0000200000000280 RDI: 000000000000000b\nRBP: 00007f47cc011e19 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000\nR13: 00007f47cc1d6038 R14: 00007f47cc1d5fa0 R15: 00007ffc512f8aa8\n \u003c/TASK\u003e\n\nThe buggy address belongs to the physical page:\npage: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff888036bacd00 pfn:0x36bac\nflags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)\nraw: 00fff00000000000 ffffea0001243d08 ffff8880b863fdc0 0000000000000000\nraw: ffff888036bacd00 0000000000000000 00000000ffffffff 0000000000000000\npage dumped because: kasan: bad access detected\npage_owner tracks the page as freed\npage last allocated via order 2, migratetype Unmovable, gfp_mask 0x446dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO|__GFP_NOWARN|__GFP_RETRY_MAYFAIL|__GFP_COMP), pid 16741, tgid 16741 (syz-executor), ts 343313197788, free_ts 380670750466\n set_page_owner include/linux/page_owner.h:32 [inline]\n post_alloc_hook+0x240/0x2a0 mm/page_alloc.c:1851\n prep_new_page mm/page_alloc.c:1859 [inline]\n get_page_from_freelist+0x21e4/0x22c0 mm/page_alloc.c:3858\n __alloc_frozen_pages_noprof+0x181/0x370 mm/page_alloc.c:5148\n alloc_pages_mpol+0x232/0x4a0 mm/mempolicy.c:2416\n ___kmalloc_large_node+0x5f/0x1b0 mm/slub.c:4317\n __kmalloc_large_node_noprof+0x18/0x90 mm/slub.c:4348\n __do_kmalloc_node mm/slub.c:4364 [inline]\n __kvmalloc_node\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40064",
"url": "https://www.suse.com/security/cve/CVE-2025-40064"
},
{
"category": "external",
"summary": "SUSE Bug 1252845 for CVE-2025-40064",
"url": "https://bugzilla.suse.com/1252845"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40064"
},
{
"cve": "CVE-2025-40065",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40065"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRISC-V: KVM: Write hgatp register with valid mode bits\n\nAccording to the RISC-V Privileged Architecture Spec, when MODE=Bare\nis selected,software must write zero to the remaining fields of hgatp.\n\nWe have detected the valid mode supported by the HW before, So using a\nvalid mode to detect how many vmid bits are supported.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40065",
"url": "https://www.suse.com/security/cve/CVE-2025-40065"
},
{
"category": "external",
"summary": "SUSE Bug 1252846 for CVE-2025-40065",
"url": "https://bugzilla.suse.com/1252846"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40065"
},
{
"cve": "CVE-2025-40066",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40066"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mt76: mt7996: Check phy before init msta_link in mt7996_mac_sta_add_links()\n\nIn order to avoid a possible NULL pointer dereference in\nmt7996_mac_sta_init_link routine, move the phy pointer check before\nrunning mt7996_mac_sta_init_link() in mt7996_mac_sta_add_links routine.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40066",
"url": "https://www.suse.com/security/cve/CVE-2025-40066"
},
{
"category": "external",
"summary": "SUSE Bug 1252842 for CVE-2025-40066",
"url": "https://bugzilla.suse.com/1252842"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40066"
},
{
"cve": "CVE-2025-40067",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40067"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/ntfs3: reject index allocation if $BITMAP is empty but blocks exist\n\nIndex allocation requires at least one bit in the $BITMAP attribute to\ntrack usage of index entries. If the bitmap is empty while index blocks\nare already present, this reflects on-disk corruption.\n\nsyzbot triggered this condition using a malformed NTFS image. During a\nrename() operation involving a long filename (which spans multiple\nindex entries), the empty bitmap allowed the name to be added without\nvalid tracking. Subsequent deletion of the original entry failed with\n-ENOENT, due to unexpected index state.\n\nReject such cases by verifying that the bitmap is not empty when index\nblocks exist.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40067",
"url": "https://www.suse.com/security/cve/CVE-2025-40067"
},
{
"category": "external",
"summary": "SUSE Bug 1252840 for CVE-2025-40067",
"url": "https://bugzilla.suse.com/1252840"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40067"
},
{
"cve": "CVE-2025-40068",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40068"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs: ntfs3: Fix integer overflow in run_unpack()\n\nThe MFT record relative to the file being opened contains its runlist,\nan array containing information about the file\u0027s location on the physical\ndisk. Analysis of all Call Stack paths showed that the values of the\nrunlist array, from which LCNs are calculated, are not validated before\nrun_unpack function.\n\nThe run_unpack function decodes the compressed runlist data format\nfrom MFT attributes (for example, $DATA), converting them into a runs_tree\nstructure, which describes the mapping of virtual clusters (VCN) to\nlogical clusters (LCN). The NTFS3 subsystem also has a shortcut for\ndeleting files from MFT records - in this case, the RUN_DEALLOCATE\ncommand is sent to the run_unpack input, and the function logic\nprovides that all data transferred to the runlist about file or\ndirectory is deleted without creating a runs_tree structure.\n\nSubstituting the runlist in the $DATA attribute of the MFT record for an\narbitrary file can lead either to access to arbitrary data on the disk\nbypassing access checks to them (since the inode access check\noccurs above) or to destruction of arbitrary data on the disk.\n\nAdd overflow check for addition operation.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40068",
"url": "https://www.suse.com/security/cve/CVE-2025-40068"
},
{
"category": "external",
"summary": "SUSE Bug 1252843 for CVE-2025-40068",
"url": "https://bugzilla.suse.com/1252843"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40068"
},
{
"cve": "CVE-2025-40069",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40069"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/msm: Fix obj leak in VM_BIND error path\n\nIf we fail a handle-lookup part way thru, we need to drop the already\nobtained obj references.\n\nPatchwork: https://patchwork.freedesktop.org/patch/669784/",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40069",
"url": "https://www.suse.com/security/cve/CVE-2025-40069"
},
{
"category": "external",
"summary": "SUSE Bug 1252831 for CVE-2025-40069",
"url": "https://bugzilla.suse.com/1252831"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40069"
},
{
"cve": "CVE-2025-40070",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40070"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npps: fix warning in pps_register_cdev when register device fail\n\nSimilar to previous commit 2a934fdb01db (\"media: v4l2-dev: fix error\nhandling in __video_register_device()\"), the release hook should be set\nbefore device_register(). Otherwise, when device_register() return error\nand put_device() try to callback the release function, the below warning\nmay happen.\n\n ------------[ cut here ]------------\n WARNING: CPU: 1 PID: 4760 at drivers/base/core.c:2567 device_release+0x1bd/0x240 drivers/base/core.c:2567\n Modules linked in:\n CPU: 1 UID: 0 PID: 4760 Comm: syz.4.914 Not tainted 6.17.0-rc3+ #1 NONE\n RIP: 0010:device_release+0x1bd/0x240 drivers/base/core.c:2567\n Call Trace:\n \u003cTASK\u003e\n kobject_cleanup+0x136/0x410 lib/kobject.c:689\n kobject_release lib/kobject.c:720 [inline]\n kref_put include/linux/kref.h:65 [inline]\n kobject_put+0xe9/0x130 lib/kobject.c:737\n put_device+0x24/0x30 drivers/base/core.c:3797\n pps_register_cdev+0x2da/0x370 drivers/pps/pps.c:402\n pps_register_source+0x2f6/0x480 drivers/pps/kapi.c:108\n pps_tty_open+0x190/0x310 drivers/pps/clients/pps-ldisc.c:57\n tty_ldisc_open+0xa7/0x120 drivers/tty/tty_ldisc.c:432\n tty_set_ldisc+0x333/0x780 drivers/tty/tty_ldisc.c:563\n tiocsetd drivers/tty/tty_io.c:2429 [inline]\n tty_ioctl+0x5d1/0x1700 drivers/tty/tty_io.c:2728\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:598 [inline]\n __se_sys_ioctl fs/ioctl.c:584 [inline]\n __x64_sys_ioctl+0x194/0x210 fs/ioctl.c:584\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0x5f/0x2a0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n \u003c/TASK\u003e\n\nBefore commit c79a39dc8d06 (\"pps: Fix a use-after-free\"),\npps_register_cdev() call device_create() to create pps-\u003edev, which will\ninit dev-\u003erelease to device_create_release(). Now the comment is outdated,\njust remove it.\n\nThanks for the reminder from Calvin Owens, \u0027kfree_pps\u0027 should be removed\nin pps_register_source() to avoid a double free in the failure case.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40070",
"url": "https://www.suse.com/security/cve/CVE-2025-40070"
},
{
"category": "external",
"summary": "SUSE Bug 1252836 for CVE-2025-40070",
"url": "https://bugzilla.suse.com/1252836"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40070"
},
{
"cve": "CVE-2025-40071",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40071"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntty: n_gsm: Don\u0027t block input queue by waiting MSC\n\nCurrently gsm_queue() processes incoming frames and when opening\na DLC channel it calls gsm_dlci_open() which calls gsm_modem_update().\nIf basic mode is used it calls gsm_modem_upd_via_msc() and it\ncannot block the input queue by waiting the response to come\ninto the same input queue.\n\nInstead allow sending Modem Status Command without waiting for remote\nend to respond. Define a new function gsm_modem_send_initial_msc()\nfor this purpose. As MSC is only valid for basic encoding, it does\nnot do anything for advanced or when convergence layer type 2 is used.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40071",
"url": "https://www.suse.com/security/cve/CVE-2025-40071"
},
{
"category": "external",
"summary": "SUSE Bug 1252797 for CVE-2025-40071",
"url": "https://bugzilla.suse.com/1252797"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40071"
},
{
"cve": "CVE-2025-40072",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40072"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfanotify: Validate the return value of mnt_ns_from_dentry() before dereferencing\n\nThe function do_fanotify_mark() does not validate if\nmnt_ns_from_dentry() returns NULL before dereferencing mntns-\u003euser_ns.\nThis causes a NULL pointer dereference in do_fanotify_mark() if the\npath is not a mount namespace object.\n\nFix this by checking mnt_ns_from_dentry()\u0027s return value before\ndereferencing it.\n\nBefore the patch\n\n$ gcc fanotify_nullptr.c -o fanotify_nullptr\n$ mkdir A\n$ ./fanotify_nullptr\nFanotify fd: 3\nfanotify_mark: Operation not permitted\n$ unshare -Urm\nFanotify fd: 3\nKilled\n\nint main(void){\n int ffd;\n ffd = fanotify_init(FAN_CLASS_NOTIF | FAN_REPORT_MNT, 0);\n if(ffd \u003c 0){\n perror(\"fanotify_init\");\n exit(EXIT_FAILURE);\n }\n\n printf(\"Fanotify fd: %d\\n\",ffd);\n\n if(fanotify_mark(ffd, FAN_MARK_ADD | FAN_MARK_MNTNS,\nFAN_MNT_ATTACH, AT_FDCWD, \"A\") \u003c 0){\n perror(\"fanotify_mark\");\n exit(EXIT_FAILURE);\n }\n\nreturn 0;\n}\n\nAfter the patch\n\n$ gcc fanotify_nullptr.c -o fanotify_nullptr\n$ mkdir A\n$ ./fanotify_nullptr\nFanotify fd: 3\nfanotify_mark: Operation not permitted\n$ unshare -Urm\nFanotify fd: 3\nfanotify_mark: Invalid argument\n\n[ 25.694973] BUG: kernel NULL pointer dereference, address: 0000000000000038\n[ 25.695006] #PF: supervisor read access in kernel mode\n[ 25.695012] #PF: error_code(0x0000) - not-present page\n[ 25.695017] PGD 109a30067 P4D 109a30067 PUD 142b46067 PMD 0\n[ 25.695025] Oops: Oops: 0000 [#1] SMP NOPTI\n[ 25.695032] CPU: 4 UID: 1000 PID: 1478 Comm: fanotify_nullpt Not\ntainted 6.17.0-rc4 #1 PREEMPT(lazy)\n[ 25.695040] Hardware name: VMware, Inc. VMware Virtual\nPlatform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020\n[ 25.695049] RIP: 0010:do_fanotify_mark+0x817/0x950\n[ 25.695066] Code: 04 00 00 e9 45 fd ff ff 48 8b 7c 24 48 4c 89 54\n24 18 4c 89 5c 24 10 4c 89 0c 24 e8 b3 11 fc ff 4c 8b 54 24 18 4c 8b\n5c 24 10 \u003c48\u003e 8b 78 38 4c 8b 0c 24 49 89 c4 e9 13 fd ff ff 8b 4c 24 28\n85 c9\n[ 25.695081] RSP: 0018:ffffd31c469e3c08 EFLAGS: 00010203\n[ 25.695104] RAX: 0000000000000000 RBX: 0000000001000000 RCX: ffff8eb48aebd220\n[ 25.695110] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff8eb4835e8180\n[ 25.695115] RBP: 0000000000000111 R08: 0000000000000000 R09: 0000000000000000\n[ 25.695142] R10: ffff8eb48a7d56c0 R11: ffff8eb482bede00 R12: 00000000004012a7\n[ 25.695148] R13: 0000000000000110 R14: 0000000000000001 R15: ffff8eb48a7d56c0\n[ 25.695154] FS: 00007f8733bda740(0000) GS:ffff8eb61ce5f000(0000)\nknlGS:0000000000000000\n[ 25.695162] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 25.695170] CR2: 0000000000000038 CR3: 0000000136994006 CR4: 00000000003706f0\n[ 25.695201] Call Trace:\n[ 25.695209] \u003cTASK\u003e\n[ 25.695215] __x64_sys_fanotify_mark+0x1f/0x30\n[ 25.695222] do_syscall_64+0x82/0x2c0\n...",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40072",
"url": "https://www.suse.com/security/cve/CVE-2025-40072"
},
{
"category": "external",
"summary": "SUSE Bug 1252796 for CVE-2025-40072",
"url": "https://bugzilla.suse.com/1252796"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40072"
},
{
"cve": "CVE-2025-40073",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40073"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/msm: Do not validate SSPP when it is not ready\n\nCurrent code will validate current plane and previous plane to\nconfirm they can share a SSPP with multi-rect mode. The SSPP\nis already allocated for previous plane, while current plane\nis not associated with any SSPP yet. Null pointer is referenced\nwhen validating the SSPP of current plane. Skip SSPP validation\nfor current plane.\n\nUnable to handle kernel NULL pointer dereference at virtual address 0000000000000020\nMem abort info:\n ESR = 0x0000000096000004\n EC = 0x25: DABT (current EL), IL = 32 bits\n SET = 0, FnV = 0\n EA = 0, S1PTW = 0\n FSC = 0x04: level 0 translation fault\nData abort info:\n ISV = 0, ISS = 0x00000004, ISS2 = 0x00000000\n CM = 0, WnR = 0, TnD = 0, TagAccess = 0\n GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0\nuser pgtable: 4k pages, 48-bit VAs, pgdp=0000000888ac3000\n[0000000000000020] pgd=0000000000000000, p4d=0000000000000000\nInternal error: Oops: 0000000096000004 [#1] SMP\nModules linked in:\nCPU: 4 UID: 0 PID: 1891 Comm: modetest Tainted: G S 6.15.0-rc2-g3ee3f6e1202e #335 PREEMPT\nTainted: [S]=CPU_OUT_OF_SPEC\nHardware name: SM8650 EV1 rev1 4slam 2et (DT)\npstate: 63400009 (nZCv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--)\npc : dpu_plane_is_multirect_capable+0x68/0x90\nlr : dpu_assign_plane_resources+0x288/0x410\nsp : ffff800093dcb770\nx29: ffff800093dcb770 x28: 0000000000002000 x27: ffff000817c6c000\nx26: ffff000806b46368 x25: ffff0008013f6080 x24: ffff00080cbf4800\nx23: ffff000810842680 x22: ffff0008013f1080 x21: ffff00080cc86080\nx20: ffff000806b463b0 x19: ffff00080cbf5a00 x18: 00000000ffffffff\nx17: 707a5f657a696c61 x16: 0000000000000003 x15: 0000000000002200\nx14: 00000000ffffffff x13: 00aaaaaa00aaaaaa x12: 0000000000000000\nx11: ffff000817c6e2b8 x10: 0000000000000000 x9 : ffff80008106a950\nx8 : ffff00080cbf48f4 x7 : 0000000000000000 x6 : 0000000000000000\nx5 : 0000000000000000 x4 : 0000000000000438 x3 : 0000000000000438\nx2 : ffff800082e245e0 x1 : 0000000000000008 x0 : 0000000000000000\nCall trace:\n dpu_plane_is_multirect_capable+0x68/0x90 (P)\n dpu_crtc_atomic_check+0x5bc/0x650\n drm_atomic_helper_check_planes+0x13c/0x220\n drm_atomic_helper_check+0x58/0xb8\n msm_atomic_check+0xd8/0xf0\n drm_atomic_check_only+0x4a8/0x968\n drm_atomic_commit+0x50/0xd8\n drm_atomic_helper_update_plane+0x140/0x188\n __setplane_atomic+0xfc/0x148\n drm_mode_setplane+0x164/0x378\n drm_ioctl_kernel+0xc0/0x140\n drm_ioctl+0x20c/0x500\n __arm64_sys_ioctl+0xbc/0xf8\n invoke_syscall+0x50/0x120\n el0_svc_common.constprop.0+0x48/0xf8\n do_el0_svc+0x28/0x40\n el0_svc+0x30/0xd0\n el0t_64_sync_handler+0x144/0x168\n el0t_64_sync+0x198/0x1a0\nCode: b9402021 370fffc1 f9401441 3707ff81 (f94010a1)\n---[ end trace 0000000000000000 ]---\n\nPatchwork: https://patchwork.freedesktop.org/patch/669224/",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40073",
"url": "https://www.suse.com/security/cve/CVE-2025-40073"
},
{
"category": "external",
"summary": "SUSE Bug 1252798 for CVE-2025-40073",
"url": "https://bugzilla.suse.com/1252798"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40073"
},
{
"cve": "CVE-2025-40074",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40074"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv4: start using dst_dev_rcu()\n\nChange icmpv4_xrlim_allow(), ip_defrag() to prevent possible UAF.\n\nChange ipmr_prepare_xmit(), ipmr_queue_fwd_xmit(), ip_mr_output(),\nipv4_neigh_lookup() to use lockdep enabled dst_dev_rcu().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40074",
"url": "https://www.suse.com/security/cve/CVE-2025-40074"
},
{
"category": "external",
"summary": "SUSE Bug 1252794 for CVE-2025-40074",
"url": "https://bugzilla.suse.com/1252794"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40074"
},
{
"cve": "CVE-2025-40075",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40075"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp_metrics: use dst_dev_net_rcu()\n\nReplace three dst_dev() with a lockdep enabled helper.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40075",
"url": "https://www.suse.com/security/cve/CVE-2025-40075"
},
{
"category": "external",
"summary": "SUSE Bug 1252795 for CVE-2025-40075",
"url": "https://bugzilla.suse.com/1252795"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40075"
},
{
"cve": "CVE-2025-40076",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40076"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nPCI: rcar-host: Pass proper IRQ domain to generic_handle_domain_irq()\n\nStarting with commit dd26c1a23fd5 (\"PCI: rcar-host: Switch to\nmsi_create_parent_irq_domain()\"), the MSI parent IRQ domain is NULL because\nthe object of type struct irq_domain_info passed to:\n\nmsi_create_parent_irq_domain() -\u003e\n irq_domain_instantiate()() -\u003e\n __irq_domain_instantiate()\n\nhas no reference to the parent IRQ domain. Using msi-\u003edomain-\u003eparent as an\nargument for generic_handle_domain_irq() leads to below error:\n\n\t\"Unable to handle kernel NULL pointer dereference at virtual address\"\n\nThis error was identified while switching the upcoming RZ/G3S PCIe host\ncontroller driver to msi_create_parent_irq_domain() (which was using a\nsimilar pattern to handle MSIs (see link section)), but it was not tested\non hardware using the pcie-rcar-host controller driver due to lack of\nhardware.\n\n[mani: reworded subject and description]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40076",
"url": "https://www.suse.com/security/cve/CVE-2025-40076"
},
{
"category": "external",
"summary": "SUSE Bug 1252792 for CVE-2025-40076",
"url": "https://bugzilla.suse.com/1252792"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40076"
},
{
"cve": "CVE-2025-40077",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40077"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nf2fs: fix to avoid overflow while left shift operation\n\nShould cast type of folio-\u003eindex from pgoff_t to loff_t to avoid overflow\nwhile left shift operation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40077",
"url": "https://www.suse.com/security/cve/CVE-2025-40077"
},
{
"category": "external",
"summary": "SUSE Bug 1252782 for CVE-2025-40077",
"url": "https://bugzilla.suse.com/1252782"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40077"
},
{
"cve": "CVE-2025-40078",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40078"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Explicitly check accesses to bpf_sock_addr\n\nSyzkaller found a kernel warning on the following sock_addr program:\n\n 0: r0 = 0\n 1: r2 = *(u32 *)(r1 +60)\n 2: exit\n\nwhich triggers:\n\n verifier bug: error during ctx access conversion (0)\n\nThis is happening because offset 60 in bpf_sock_addr corresponds to an\nimplicit padding of 4 bytes, right after msg_src_ip4. Access to this\npadding isn\u0027t rejected in sock_addr_is_valid_access and it thus later\nfails to convert the access.\n\nThis patch fixes it by explicitly checking the various fields of\nbpf_sock_addr in sock_addr_is_valid_access.\n\nI checked the other ctx structures and is_valid_access functions and\ndidn\u0027t find any other similar cases. Other cases of (properly handled)\npadding are covered in new tests in a subsequent patch.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40078",
"url": "https://www.suse.com/security/cve/CVE-2025-40078"
},
{
"category": "external",
"summary": "SUSE Bug 1252789 for CVE-2025-40078",
"url": "https://bugzilla.suse.com/1252789"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40078"
},
{
"cve": "CVE-2025-40079",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40079"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nriscv, bpf: Sign extend struct ops return values properly\n\nThe ns_bpf_qdisc selftest triggers a kernel panic:\n\n Unable to handle kernel paging request at virtual address ffffffffa38dbf58\n Current test_progs pgtable: 4K pagesize, 57-bit VAs, pgdp=0x00000001109cc000\n [ffffffffa38dbf58] pgd=000000011fffd801, p4d=000000011fffd401, pud=000000011fffd001, pmd=0000000000000000\n Oops [#1]\n Modules linked in: bpf_testmod(OE) xt_conntrack nls_iso8859_1 [...] [last unloaded: bpf_testmod(OE)]\n CPU: 1 UID: 0 PID: 23584 Comm: test_progs Tainted: G W OE 6.17.0-rc1-g2465bb83e0b4 #1 NONE\n Tainted: [W]=WARN, [O]=OOT_MODULE, [E]=UNSIGNED_MODULE\n Hardware name: Unknown Unknown Product/Unknown Product, BIOS 2024.01+dfsg-1ubuntu5.1 01/01/2024\n epc : __qdisc_run+0x82/0x6f0\n ra : __qdisc_run+0x6e/0x6f0\n epc : ffffffff80bd5c7a ra : ffffffff80bd5c66 sp : ff2000000eecb550\n gp : ffffffff82472098 tp : ff60000096895940 t0 : ffffffff8001f180\n t1 : ffffffff801e1664 t2 : 0000000000000000 s0 : ff2000000eecb5d0\n s1 : ff60000093a6a600 a0 : ffffffffa38dbee8 a1 : 0000000000000001\n a2 : ff2000000eecb510 a3 : 0000000000000001 a4 : 0000000000000000\n a5 : 0000000000000010 a6 : 0000000000000000 a7 : 0000000000735049\n s2 : ffffffffa38dbee8 s3 : 0000000000000040 s4 : ff6000008bcda000\n s5 : 0000000000000008 s6 : ff60000093a6a680 s7 : ff60000093a6a6f0\n s8 : ff60000093a6a6ac s9 : ff60000093140000 s10: 0000000000000000\n s11: ff2000000eecb9d0 t3 : 0000000000000000 t4 : 0000000000ff0000\n t5 : 0000000000000000 t6 : ff60000093a6a8b6\n status: 0000000200000120 badaddr: ffffffffa38dbf58 cause: 000000000000000d\n [\u003cffffffff80bd5c7a\u003e] __qdisc_run+0x82/0x6f0\n [\u003cffffffff80b6fe58\u003e] __dev_queue_xmit+0x4c0/0x1128\n [\u003cffffffff80b80ae0\u003e] neigh_resolve_output+0xd0/0x170\n [\u003cffffffff80d2daf6\u003e] ip6_finish_output2+0x226/0x6c8\n [\u003cffffffff80d31254\u003e] ip6_finish_output+0x10c/0x2a0\n [\u003cffffffff80d31446\u003e] ip6_output+0x5e/0x178\n [\u003cffffffff80d2e232\u003e] ip6_xmit+0x29a/0x608\n [\u003cffffffff80d6f4c6\u003e] inet6_csk_xmit+0xe6/0x140\n [\u003cffffffff80c985e4\u003e] __tcp_transmit_skb+0x45c/0xaa8\n [\u003cffffffff80c995fe\u003e] tcp_connect+0x9ce/0xd10\n [\u003cffffffff80d66524\u003e] tcp_v6_connect+0x4ac/0x5e8\n [\u003cffffffff80cc19b8\u003e] __inet_stream_connect+0xd8/0x318\n [\u003cffffffff80cc1c36\u003e] inet_stream_connect+0x3e/0x68\n [\u003cffffffff80b42b20\u003e] __sys_connect_file+0x50/0x88\n [\u003cffffffff80b42bee\u003e] __sys_connect+0x96/0xc8\n [\u003cffffffff80b42c40\u003e] __riscv_sys_connect+0x20/0x30\n [\u003cffffffff80e5bcae\u003e] do_trap_ecall_u+0x256/0x378\n [\u003cffffffff80e69af2\u003e] handle_exception+0x14a/0x156\n Code: 892a 0363 1205 489c 8bc1 c7e5 2d03 084a 2703 080a (2783) 0709\n ---[ end trace 0000000000000000 ]---\n\nThe bpf_fifo_dequeue prog returns a skb which is a pointer. The pointer\nis treated as a 32bit value and sign extend to 64bit in epilogue. This\nbehavior is right for most bpf prog types but wrong for struct ops which\nrequires RISC-V ABI.\n\nSo let\u0027s sign extend struct ops return values according to the function\nmodel and RISC-V ABI([0]).\n\n [0]: https://riscv.org/wp-content/uploads/2024/12/riscv-calling.pdf",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40079",
"url": "https://www.suse.com/security/cve/CVE-2025-40079"
},
{
"category": "external",
"summary": "SUSE Bug 1252786 for CVE-2025-40079",
"url": "https://bugzilla.suse.com/1252786"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40079"
},
{
"cve": "CVE-2025-40080",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40080"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnbd: restrict sockets to TCP and UDP\n\nRecently, syzbot started to abuse NBD with all kinds of sockets.\n\nCommit cf1b2326b734 (\"nbd: verify socket is supported during setup\")\nmade sure the socket supported a shutdown() method.\n\nExplicitely accept TCP and UNIX stream sockets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40080",
"url": "https://www.suse.com/security/cve/CVE-2025-40080"
},
{
"category": "external",
"summary": "SUSE Bug 1252774 for CVE-2025-40080",
"url": "https://bugzilla.suse.com/1252774"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40080"
},
{
"cve": "CVE-2025-40081",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40081"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nperf: arm_spe: Prevent overflow in PERF_IDX2OFF()\n\nCast nr_pages to unsigned long to avoid overflow when handling large\nAUX buffer sizes (\u003e= 2 GiB).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40081",
"url": "https://www.suse.com/security/cve/CVE-2025-40081"
},
{
"category": "external",
"summary": "SUSE Bug 1252776 for CVE-2025-40081",
"url": "https://bugzilla.suse.com/1252776"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40081"
},
{
"cve": "CVE-2025-40082",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40082"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhfsplus: fix slab-out-of-bounds read in hfsplus_uni2asc()\n\nBUG: KASAN: slab-out-of-bounds in hfsplus_uni2asc+0xa71/0xb90 fs/hfsplus/unicode.c:186\nRead of size 2 at addr ffff8880289ef218 by task syz.6.248/14290\n\nCPU: 0 UID: 0 PID: 14290 Comm: syz.6.248 Not tainted 6.16.4 #1 PREEMPT(full)\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014\nCall Trace:\n \u003cTASK\u003e\n __dump_stack lib/dump_stack.c:94 [inline]\n dump_stack_lvl+0x116/0x1b0 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:378 [inline]\n print_report+0xca/0x5f0 mm/kasan/report.c:482\n kasan_report+0xca/0x100 mm/kasan/report.c:595\n hfsplus_uni2asc+0xa71/0xb90 fs/hfsplus/unicode.c:186\n hfsplus_listxattr+0x5b6/0xbd0 fs/hfsplus/xattr.c:738\n vfs_listxattr+0xbe/0x140 fs/xattr.c:493\n listxattr+0xee/0x190 fs/xattr.c:924\n filename_listxattr fs/xattr.c:958 [inline]\n path_listxattrat+0x143/0x360 fs/xattr.c:988\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xcb/0x4c0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7fe0e9fae16d\nCode: 02 b8 ff ff ff ff c3 66 0f 1f 44 00 00 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007fe0eae67f98 EFLAGS: 00000246 ORIG_RAX: 00000000000000c3\nRAX: ffffffffffffffda RBX: 00007fe0ea205fa0 RCX: 00007fe0e9fae16d\nRDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000200000000000\nRBP: 00007fe0ea0480f0 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000\nR13: 00007fe0ea206038 R14: 00007fe0ea205fa0 R15: 00007fe0eae48000\n \u003c/TASK\u003e\n\nAllocated by task 14290:\n kasan_save_stack+0x24/0x50 mm/kasan/common.c:47\n kasan_save_track+0x14/0x30 mm/kasan/common.c:68\n poison_kmalloc_redzone mm/kasan/common.c:377 [inline]\n __kasan_kmalloc+0xaa/0xb0 mm/kasan/common.c:394\n kasan_kmalloc include/linux/kasan.h:260 [inline]\n __do_kmalloc_node mm/slub.c:4333 [inline]\n __kmalloc_noprof+0x219/0x540 mm/slub.c:4345\n kmalloc_noprof include/linux/slab.h:909 [inline]\n hfsplus_find_init+0x95/0x1f0 fs/hfsplus/bfind.c:21\n hfsplus_listxattr+0x331/0xbd0 fs/hfsplus/xattr.c:697\n vfs_listxattr+0xbe/0x140 fs/xattr.c:493\n listxattr+0xee/0x190 fs/xattr.c:924\n filename_listxattr fs/xattr.c:958 [inline]\n path_listxattrat+0x143/0x360 fs/xattr.c:988\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xcb/0x4c0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nWhen hfsplus_uni2asc is called from hfsplus_listxattr,\nit actually passes in a struct hfsplus_attr_unistr*.\nThe size of the corresponding structure is different from that of hfsplus_unistr,\nso the previous fix (94458781aee6) is insufficient.\nThe pointer on the unicode buffer is still going beyond the allocated memory.\n\nThis patch introduces two warpper functions hfsplus_uni2asc_xattr_str and\nhfsplus_uni2asc_str to process two unicode buffers,\nstruct hfsplus_attr_unistr* and struct hfsplus_unistr* respectively.\nWhen ustrlen value is bigger than the allocated memory size,\nthe ustrlen value is limited to an safe size.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40082",
"url": "https://www.suse.com/security/cve/CVE-2025-40082"
},
{
"category": "external",
"summary": "SUSE Bug 1252775 for CVE-2025-40082",
"url": "https://bugzilla.suse.com/1252775"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40082"
},
{
"cve": "CVE-2025-40084",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40084"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nksmbd: transport_ipc: validate payload size before reading handle\n\nhandle_response() dereferences the payload as a 4-byte handle without\nverifying that the declared payload size is at least 4 bytes. A malformed\nor truncated message from ksmbd.mountd can lead to a 4-byte read past the\ndeclared payload size. Validate the size before dereferencing.\n\nThis is a minimal fix to guard the initial handle read.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40084",
"url": "https://www.suse.com/security/cve/CVE-2025-40084"
},
{
"category": "external",
"summary": "SUSE Bug 1252874 for CVE-2025-40084",
"url": "https://bugzilla.suse.com/1252874"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40084"
},
{
"cve": "CVE-2025-40085",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40085"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: usb-audio: Fix NULL pointer deference in try_to_register_card\n\nIn try_to_register_card(), the return value of usb_ifnum_to_if() is\npassed directly to usb_interface_claimed() without a NULL check, which\nwill lead to a NULL pointer dereference when creating an invalid\nUSB audio device. Fix this by adding a check to ensure the interface\npointer is valid before passing it to usb_interface_claimed().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40085",
"url": "https://www.suse.com/security/cve/CVE-2025-40085"
},
{
"category": "external",
"summary": "SUSE Bug 1252873 for CVE-2025-40085",
"url": "https://bugzilla.suse.com/1252873"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40085"
},
{
"cve": "CVE-2025-40086",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40086"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/xe: Don\u0027t allow evicting of BOs in same VM in array of VM binds\n\nAn array of VM binds can potentially evict other buffer objects (BOs)\nwithin the same VM under certain conditions, which may lead to NULL\npointer dereferences later in the bind pipeline. To prevent this, clear\nthe allow_res_evict flag in the xe_bo_validate call.\n\nv2:\n - Invert polarity of no_res_evict (Thomas)\n - Add comment in code explaining issue (Thomas)\n\n(cherry picked from commit 8b9ba8d6d95fe75fed6b0480bb03da4b321bea08)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40086",
"url": "https://www.suse.com/security/cve/CVE-2025-40086"
},
{
"category": "external",
"summary": "SUSE Bug 1252923 for CVE-2025-40086",
"url": "https://bugzilla.suse.com/1252923"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40086"
},
{
"cve": "CVE-2025-40087",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40087"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFSD: Define a proc_layoutcommit for the FlexFiles layout type\n\nAvoid a crash if a pNFS client should happen to send a LAYOUTCOMMIT\noperation on a FlexFiles layout.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40087",
"url": "https://www.suse.com/security/cve/CVE-2025-40087"
},
{
"category": "external",
"summary": "SUSE Bug 1252909 for CVE-2025-40087",
"url": "https://bugzilla.suse.com/1252909"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40087"
},
{
"cve": "CVE-2025-40088",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40088"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhfsplus: fix slab-out-of-bounds read in hfsplus_strcasecmp()\n\nThe hfsplus_strcasecmp() logic can trigger the issue:\n\n[ 117.317703][ T9855] ==================================================================\n[ 117.318353][ T9855] BUG: KASAN: slab-out-of-bounds in hfsplus_strcasecmp+0x1bc/0x490\n[ 117.318991][ T9855] Read of size 2 at addr ffff88802160f40c by task repro/9855\n[ 117.319577][ T9855]\n[ 117.319773][ T9855] CPU: 0 UID: 0 PID: 9855 Comm: repro Not tainted 6.17.0-rc6 #33 PREEMPT(full)\n[ 117.319780][ T9855] Hardware name: QEMU Ubuntu 24.04 PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014\n[ 117.319783][ T9855] Call Trace:\n[ 117.319785][ T9855] \u003cTASK\u003e\n[ 117.319788][ T9855] dump_stack_lvl+0x1c1/0x2a0\n[ 117.319795][ T9855] ? __virt_addr_valid+0x1c8/0x5c0\n[ 117.319803][ T9855] ? __pfx_dump_stack_lvl+0x10/0x10\n[ 117.319808][ T9855] ? rcu_is_watching+0x15/0xb0\n[ 117.319816][ T9855] ? lock_release+0x4b/0x3e0\n[ 117.319821][ T9855] ? __kasan_check_byte+0x12/0x40\n[ 117.319828][ T9855] ? __virt_addr_valid+0x1c8/0x5c0\n[ 117.319835][ T9855] ? __virt_addr_valid+0x4a5/0x5c0\n[ 117.319842][ T9855] print_report+0x17e/0x7e0\n[ 117.319848][ T9855] ? __virt_addr_valid+0x1c8/0x5c0\n[ 117.319855][ T9855] ? __virt_addr_valid+0x4a5/0x5c0\n[ 117.319862][ T9855] ? __phys_addr+0xd3/0x180\n[ 117.319869][ T9855] ? hfsplus_strcasecmp+0x1bc/0x490\n[ 117.319876][ T9855] kasan_report+0x147/0x180\n[ 117.319882][ T9855] ? hfsplus_strcasecmp+0x1bc/0x490\n[ 117.319891][ T9855] hfsplus_strcasecmp+0x1bc/0x490\n[ 117.319900][ T9855] ? __pfx_hfsplus_cat_case_cmp_key+0x10/0x10\n[ 117.319906][ T9855] hfs_find_rec_by_key+0xa9/0x1e0\n[ 117.319913][ T9855] __hfsplus_brec_find+0x18e/0x470\n[ 117.319920][ T9855] ? __pfx_hfsplus_bnode_find+0x10/0x10\n[ 117.319926][ T9855] ? __pfx_hfs_find_rec_by_key+0x10/0x10\n[ 117.319933][ T9855] ? __pfx___hfsplus_brec_find+0x10/0x10\n[ 117.319942][ T9855] hfsplus_brec_find+0x28f/0x510\n[ 117.319949][ T9855] ? __pfx_hfs_find_rec_by_key+0x10/0x10\n[ 117.319956][ T9855] ? __pfx_hfsplus_brec_find+0x10/0x10\n[ 117.319963][ T9855] ? __kmalloc_noprof+0x2a9/0x510\n[ 117.319969][ T9855] ? hfsplus_find_init+0x8c/0x1d0\n[ 117.319976][ T9855] hfsplus_brec_read+0x2b/0x120\n[ 117.319983][ T9855] hfsplus_lookup+0x2aa/0x890\n[ 117.319990][ T9855] ? __pfx_hfsplus_lookup+0x10/0x10\n[ 117.320003][ T9855] ? d_alloc_parallel+0x2f0/0x15e0\n[ 117.320008][ T9855] ? __lock_acquire+0xaec/0xd80\n[ 117.320013][ T9855] ? __pfx_d_alloc_parallel+0x10/0x10\n[ 117.320019][ T9855] ? __raw_spin_lock_init+0x45/0x100\n[ 117.320026][ T9855] ? __init_waitqueue_head+0xa9/0x150\n[ 117.320034][ T9855] __lookup_slow+0x297/0x3d0\n[ 117.320039][ T9855] ? __pfx___lookup_slow+0x10/0x10\n[ 117.320045][ T9855] ? down_read+0x1ad/0x2e0\n[ 117.320055][ T9855] lookup_slow+0x53/0x70\n[ 117.320065][ T9855] walk_component+0x2f0/0x430\n[ 117.320073][ T9855] path_lookupat+0x169/0x440\n[ 117.320081][ T9855] filename_lookup+0x212/0x590\n[ 117.320089][ T9855] ? __pfx_filename_lookup+0x10/0x10\n[ 117.320098][ T9855] ? strncpy_from_user+0x150/0x290\n[ 117.320105][ T9855] ? getname_flags+0x1e5/0x540\n[ 117.320112][ T9855] user_path_at+0x3a/0x60\n[ 117.320117][ T9855] __x64_sys_umount+0xee/0x160\n[ 117.320123][ T9855] ? __pfx___x64_sys_umount+0x10/0x10\n[ 117.320129][ T9855] ? do_syscall_64+0xb7/0x3a0\n[ 117.320135][ T9855] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f\n[ 117.320141][ T9855] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f\n[ 117.320145][ T9855] do_syscall_64+0xf3/0x3a0\n[ 117.320150][ T9855] ? exc_page_fault+0x9f/0xf0\n[ 117.320154][ T9855] entry_SYSCALL_64_after_hwframe+0x77/0x7f\n[ 117.320158][ T9855] RIP: 0033:0x7f7dd7908b07\n[ 117.320163][ T9855] Code: 23 0d 00 f7 d8 64 89 01 48 83 c8 ff c3 66 0f 1f 44 00 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 08\n[ 117.320167][ T9855] RSP: 002b:00007ffd5ebd9698 EFLAGS: 00000202 \n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40088",
"url": "https://www.suse.com/security/cve/CVE-2025-40088"
},
{
"category": "external",
"summary": "SUSE Bug 1252904 for CVE-2025-40088",
"url": "https://bugzilla.suse.com/1252904"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40088"
},
{
"cve": "CVE-2025-40089",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40089"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncxl/features: Add check for no entries in cxl_feature_info\n\ncxl EDAC calls cxl_feature_info() to get the feature information and\nif the hardware has no Features support, cxlfs may be passed in as\nNULL.\n\n[ 51.957498] BUG: kernel NULL pointer dereference, address: 0000000000000008\n[ 51.965571] #PF: supervisor read access in kernel mode\n[ 51.971559] #PF: error_code(0x0000) - not-present page\n[ 51.977542] PGD 17e4f6067 P4D 0\n[ 51.981384] Oops: Oops: 0000 [#1] SMP NOPTI\n[ 51.986300] CPU: 49 UID: 0 PID: 3782 Comm: systemd-udevd Not tainted 6.17.0dj\ntest+ #64 PREEMPT(voluntary)\n[ 51.997355] Hardware name: \u003cremoved\u003e\n[ 52.009790] RIP: 0010:cxl_feature_info+0xa/0x80 [cxl_core]\n\nAdd a check for cxlfs before dereferencing it and return -EOPNOTSUPP if\nthere is no cxlfs created due to no hardware support.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40089",
"url": "https://www.suse.com/security/cve/CVE-2025-40089"
},
{
"category": "external",
"summary": "SUSE Bug 1252903 for CVE-2025-40089",
"url": "https://bugzilla.suse.com/1252903"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40089"
},
{
"cve": "CVE-2025-40090",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40090"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nksmbd: fix recursive locking in RPC handle list access\n\nSince commit 305853cce3794 (\"ksmbd: Fix race condition in RPC handle list\naccess\"), ksmbd_session_rpc_method() attempts to lock sess-\u003erpc_lock.\n\nThis causes hung connections / tasks when a client attempts to open\na named pipe. Using Samba\u0027s rpcclient tool:\n\n $ rpcclient //192.168.1.254 -U user%password\n $ rpcclient $\u003e srvinfo\n \u003cconnection hung here\u003e\n\nKernel side:\n \"echo 0 \u003e /proc/sys/kernel/hung_task_timeout_secs\" disables this message.\n task:kworker/0:0 state:D stack:0 pid:5021 tgid:5021 ppid:2 flags:0x00200000\n Workqueue: ksmbd-io handle_ksmbd_work\n Call trace:\n __schedule from schedule+0x3c/0x58\n schedule from schedule_preempt_disabled+0xc/0x10\n schedule_preempt_disabled from rwsem_down_read_slowpath+0x1b0/0x1d8\n rwsem_down_read_slowpath from down_read+0x28/0x30\n down_read from ksmbd_session_rpc_method+0x18/0x3c\n ksmbd_session_rpc_method from ksmbd_rpc_open+0x34/0x68\n ksmbd_rpc_open from ksmbd_session_rpc_open+0x194/0x228\n ksmbd_session_rpc_open from create_smb2_pipe+0x8c/0x2c8\n create_smb2_pipe from smb2_open+0x10c/0x27ac\n smb2_open from handle_ksmbd_work+0x238/0x3dc\n handle_ksmbd_work from process_scheduled_works+0x160/0x25c\n process_scheduled_works from worker_thread+0x16c/0x1e8\n worker_thread from kthread+0xa8/0xb8\n kthread from ret_from_fork+0x14/0x38\n Exception stack(0x8529ffb0 to 0x8529fff8)\n\nThe task deadlocks because the lock is already held:\n ksmbd_session_rpc_open\n down_write(\u0026sess-\u003erpc_lock)\n ksmbd_rpc_open\n ksmbd_session_rpc_method\n down_read(\u0026sess-\u003erpc_lock) \u003c-- deadlock\n\nAdjust ksmbd_session_rpc_method() callers to take the lock when necessary.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40090",
"url": "https://www.suse.com/security/cve/CVE-2025-40090"
},
{
"category": "external",
"summary": "SUSE Bug 1252910 for CVE-2025-40090",
"url": "https://bugzilla.suse.com/1252910"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40090"
},
{
"cve": "CVE-2025-40091",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40091"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nixgbe: fix too early devlink_free() in ixgbe_remove()\n\nSince ixgbe_adapter is embedded in devlink, calling devlink_free()\nprematurely in the ixgbe_remove() path can lead to UAF. Move devlink_free()\nto the end.\n\nKASAN report:\n\n BUG: KASAN: use-after-free in ixgbe_reset_interrupt_capability+0x140/0x180 [ixgbe]\n Read of size 8 at addr ffff0000adf813e0 by task bash/2095\n CPU: 1 UID: 0 PID: 2095 Comm: bash Tainted: G S 6.17.0-rc2-tnguy.net-queue+ #1 PREEMPT(full)\n [...]\n Call trace:\n show_stack+0x30/0x90 (C)\n dump_stack_lvl+0x9c/0xd0\n print_address_description.constprop.0+0x90/0x310\n print_report+0x104/0x1f0\n kasan_report+0x88/0x180\n __asan_report_load8_noabort+0x20/0x30\n ixgbe_reset_interrupt_capability+0x140/0x180 [ixgbe]\n ixgbe_clear_interrupt_scheme+0xf8/0x130 [ixgbe]\n ixgbe_remove+0x2d0/0x8c0 [ixgbe]\n pci_device_remove+0xa0/0x220\n device_remove+0xb8/0x170\n device_release_driver_internal+0x318/0x490\n device_driver_detach+0x40/0x68\n unbind_store+0xec/0x118\n drv_attr_store+0x64/0xb8\n sysfs_kf_write+0xcc/0x138\n kernfs_fop_write_iter+0x294/0x440\n new_sync_write+0x1fc/0x588\n vfs_write+0x480/0x6a0\n ksys_write+0xf0/0x1e0\n __arm64_sys_write+0x70/0xc0\n invoke_syscall.constprop.0+0xcc/0x280\n el0_svc_common.constprop.0+0xa8/0x248\n do_el0_svc+0x44/0x68\n el0_svc+0x54/0x160\n el0t_64_sync_handler+0xa0/0xe8\n el0t_64_sync+0x1b0/0x1b8",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40091",
"url": "https://www.suse.com/security/cve/CVE-2025-40091"
},
{
"category": "external",
"summary": "SUSE Bug 1252915 for CVE-2025-40091",
"url": "https://bugzilla.suse.com/1252915"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40091"
},
{
"cve": "CVE-2025-40092",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40092"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: gadget: f_ncm: Refactor bind path to use __free()\n\nAfter an bind/unbind cycle, the ncm-\u003enotify_req is left stale. If a\nsubsequent bind fails, the unified error label attempts to free this\nstale request, leading to a NULL pointer dereference when accessing\nep-\u003eops-\u003efree_request.\n\nRefactor the error handling in the bind path to use the __free()\nautomatic cleanup mechanism.\n\nUnable to handle kernel NULL pointer dereference at virtual address 0000000000000020\nCall trace:\n usb_ep_free_request+0x2c/0xec\n ncm_bind+0x39c/0x3dc\n usb_add_function+0xcc/0x1f0\n configfs_composite_bind+0x468/0x588\n gadget_bind_driver+0x104/0x270\n really_probe+0x190/0x374\n __driver_probe_device+0xa0/0x12c\n driver_probe_device+0x3c/0x218\n __device_attach_driver+0x14c/0x188\n bus_for_each_drv+0x10c/0x168\n __device_attach+0xfc/0x198\n device_initial_probe+0x14/0x24\n bus_probe_device+0x94/0x11c\n device_add+0x268/0x48c\n usb_add_gadget+0x198/0x28c\n dwc3_gadget_init+0x700/0x858\n __dwc3_set_mode+0x3cc/0x664\n process_scheduled_works+0x1d8/0x488\n worker_thread+0x244/0x334\n kthread+0x114/0x1bc\n ret_from_fork+0x10/0x20",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40092",
"url": "https://www.suse.com/security/cve/CVE-2025-40092"
},
{
"category": "external",
"summary": "SUSE Bug 1252916 for CVE-2025-40092",
"url": "https://bugzilla.suse.com/1252916"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40092"
},
{
"cve": "CVE-2025-40093",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40093"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: gadget: f_ecm: Refactor bind path to use __free()\n\nAfter an bind/unbind cycle, the ecm-\u003enotify_req is left stale. If a\nsubsequent bind fails, the unified error label attempts to free this\nstale request, leading to a NULL pointer dereference when accessing\nep-\u003eops-\u003efree_request.\n\nRefactor the error handling in the bind path to use the __free()\nautomatic cleanup mechanism.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40093",
"url": "https://www.suse.com/security/cve/CVE-2025-40093"
},
{
"category": "external",
"summary": "SUSE Bug 1252906 for CVE-2025-40093",
"url": "https://bugzilla.suse.com/1252906"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40093"
},
{
"cve": "CVE-2025-40094",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40094"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: gadget: f_acm: Refactor bind path to use __free()\n\nAfter an bind/unbind cycle, the acm-\u003enotify_req is left stale. If a\nsubsequent bind fails, the unified error label attempts to free this\nstale request, leading to a NULL pointer dereference when accessing\nep-\u003eops-\u003efree_request.\n\nRefactor the error handling in the bind path to use the __free()\nautomatic cleanup mechanism.\n\nUnable to handle kernel NULL pointer dereference at virtual address 0000000000000020\nCall trace:\n usb_ep_free_request+0x2c/0xec\n gs_free_req+0x30/0x44\n acm_bind+0x1b8/0x1f4\n usb_add_function+0xcc/0x1f0\n configfs_composite_bind+0x468/0x588\n gadget_bind_driver+0x104/0x270\n really_probe+0x190/0x374\n __driver_probe_device+0xa0/0x12c\n driver_probe_device+0x3c/0x218\n __device_attach_driver+0x14c/0x188\n bus_for_each_drv+0x10c/0x168\n __device_attach+0xfc/0x198\n device_initial_probe+0x14/0x24\n bus_probe_device+0x94/0x11c\n device_add+0x268/0x48c\n usb_add_gadget+0x198/0x28c\n dwc3_gadget_init+0x700/0x858\n __dwc3_set_mode+0x3cc/0x664\n process_scheduled_works+0x1d8/0x488\n worker_thread+0x244/0x334\n kthread+0x114/0x1bc\n ret_from_fork+0x10/0x20",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40094",
"url": "https://www.suse.com/security/cve/CVE-2025-40094"
},
{
"category": "external",
"summary": "SUSE Bug 1252899 for CVE-2025-40094",
"url": "https://bugzilla.suse.com/1252899"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40094"
},
{
"cve": "CVE-2025-40095",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40095"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: gadget: f_rndis: Refactor bind path to use __free()\n\nAfter an bind/unbind cycle, the rndis-\u003enotify_req is left stale. If a\nsubsequent bind fails, the unified error label attempts to free this\nstale request, leading to a NULL pointer dereference when accessing\nep-\u003eops-\u003efree_request.\n\nRefactor the error handling in the bind path to use the __free()\nautomatic cleanup mechanism.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40095",
"url": "https://www.suse.com/security/cve/CVE-2025-40095"
},
{
"category": "external",
"summary": "SUSE Bug 1252898 for CVE-2025-40095",
"url": "https://bugzilla.suse.com/1252898"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40095"
},
{
"cve": "CVE-2025-40096",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40096"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/sched: Fix potential double free in drm_sched_job_add_resv_dependencies\n\nWhen adding dependencies with drm_sched_job_add_dependency(), that\nfunction consumes the fence reference both on success and failure, so in\nthe latter case the dma_fence_put() on the error path (xarray failed to\nexpand) is a double free.\n\nInterestingly this bug appears to have been present ever since\ncommit ebd5f74255b9 (\"drm/sched: Add dependency tracking\"), since the code\nback then looked like this:\n\ndrm_sched_job_add_implicit_dependencies():\n...\n for (i = 0; i \u003c fence_count; i++) {\n ret = drm_sched_job_add_dependency(job, fences[i]);\n if (ret)\n break;\n }\n\n for (; i \u003c fence_count; i++)\n dma_fence_put(fences[i]);\n\nWhich means for the failing \u0027i\u0027 the dma_fence_put was already a double\nfree. Possibly there were no users at that time, or the test cases were\ninsufficient to hit it.\n\nThe bug was then only noticed and fixed after\ncommit 9c2ba265352a (\"drm/scheduler: use new iterator in drm_sched_job_add_implicit_dependencies v2\")\nlanded, with its fixup of\ncommit 4eaf02d6076c (\"drm/scheduler: fix drm_sched_job_add_implicit_dependencies\").\n\nAt that point it was a slightly different flavour of a double free, which\ncommit 963d0b356935 (\"drm/scheduler: fix drm_sched_job_add_implicit_dependencies harder\")\nnoticed and attempted to fix.\n\nBut it only moved the double free from happening inside the\ndrm_sched_job_add_dependency(), when releasing the reference not yet\nobtained, to the caller, when releasing the reference already released by\nthe former in the failure case.\n\nAs such it is not easy to identify the right target for the fixes tag so\nlets keep it simple and just continue the chain.\n\nWhile fixing we also improve the comment and explain the reason for taking\nthe reference and not dropping it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40096",
"url": "https://www.suse.com/security/cve/CVE-2025-40096"
},
{
"category": "external",
"summary": "SUSE Bug 1252902 for CVE-2025-40096",
"url": "https://bugzilla.suse.com/1252902"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40096"
},
{
"cve": "CVE-2025-40097",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40097"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: hda: Fix missing pointer check in hda_component_manager_init function\n\nThe __component_match_add function may assign the \u0027matchptr\u0027 pointer\nthe value ERR_PTR(-ENOMEM), which will subsequently be dereferenced.\n\nThe call stack leading to the error looks like this:\n\nhda_component_manager_init\n|-\u003e component_match_add\n |-\u003e component_match_add_release\n |-\u003e __component_match_add ( ... ,**matchptr, ... )\n |-\u003e *matchptr = ERR_PTR(-ENOMEM); // assign\n|-\u003e component_master_add_with_match( ... match)\n |-\u003e component_match_realloc(match, match-\u003enum); // dereference\n\nAdd IS_ERR() check to prevent the crash.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40097",
"url": "https://www.suse.com/security/cve/CVE-2025-40097"
},
{
"category": "external",
"summary": "SUSE Bug 1252900 for CVE-2025-40097",
"url": "https://bugzilla.suse.com/1252900"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40097"
},
{
"cve": "CVE-2025-40098",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40098"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_get_acpi_mute_state()\n\nReturn value of a function acpi_evaluate_dsm() is dereferenced without\nchecking for NULL, but it is usually checked for this function.\n\nacpi_evaluate_dsm() may return NULL, when acpi_evaluate_object() returns\nacpi_status other than ACPI_SUCCESS, so add a check to prevent the crach.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40098",
"url": "https://www.suse.com/security/cve/CVE-2025-40098"
},
{
"category": "external",
"summary": "SUSE Bug 1252917 for CVE-2025-40098",
"url": "https://bugzilla.suse.com/1252917"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40098"
},
{
"cve": "CVE-2025-40099",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40099"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncifs: parse_dfs_referrals: prevent oob on malformed input\n\nMalicious SMB server can send invalid reply to FSCTL_DFS_GET_REFERRALS\n\n- reply smaller than sizeof(struct get_dfs_referral_rsp)\n- reply with number of referrals smaller than NumberOfReferrals in the\nheader\n\nProcessing of such replies will cause oob.\n\nReturn -EINVAL error on such replies to prevent oob-s.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40099",
"url": "https://www.suse.com/security/cve/CVE-2025-40099"
},
{
"category": "external",
"summary": "SUSE Bug 1252911 for CVE-2025-40099",
"url": "https://bugzilla.suse.com/1252911"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40099"
},
{
"cve": "CVE-2025-40100",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40100"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: do not assert we found block group item when creating free space tree\n\nCurrently, when building a free space tree at populate_free_space_tree(),\nif we are not using the block group tree feature, we always expect to find\nblock group items (either extent items or a block group item with key type\nBTRFS_BLOCK_GROUP_ITEM_KEY) when we search the extent tree with\nbtrfs_search_slot_for_read(), so we assert that we found an item. However\nthis expectation is wrong since we can have a new block group created in\nthe current transaction which is still empty and for which we still have\nnot added the block group\u0027s item to the extent tree, in which case we do\nnot have any items in the extent tree associated to the block group.\n\nThe insertion of a new block group\u0027s block group item in the extent tree\nhappens at btrfs_create_pending_block_groups() when it calls the helper\ninsert_block_group_item(). This typically is done when a transaction\nhandle is released, committed or when running delayed refs (either as\npart of a transaction commit or when serving tickets for space reservation\nif we are low on free space).\n\nSo remove the assertion at populate_free_space_tree() even when the block\ngroup tree feature is not enabled and update the comment to mention this\ncase.\n\nSyzbot reported this with the following stack trace:\n\n BTRFS info (device loop3 state M): rebuilding free space tree\n assertion failed: ret == 0 :: 0, in fs/btrfs/free-space-tree.c:1115\n ------------[ cut here ]------------\n kernel BUG at fs/btrfs/free-space-tree.c:1115!\n Oops: invalid opcode: 0000 [#1] SMP KASAN PTI\n CPU: 1 UID: 0 PID: 6352 Comm: syz.3.25 Not tainted syzkaller #0 PREEMPT(full)\n Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025\n RIP: 0010:populate_free_space_tree+0x700/0x710 fs/btrfs/free-space-tree.c:1115\n Code: ff ff e8 d3 (...)\n RSP: 0018:ffffc9000430f780 EFLAGS: 00010246\n RAX: 0000000000000043 RBX: ffff88805b709630 RCX: fea61d0e2e79d000\n RDX: 0000000000000000 RSI: 0000000080000000 RDI: 0000000000000000\n RBP: ffffc9000430f8b0 R08: ffffc9000430f4a7 R09: 1ffff92000861e94\n R10: dffffc0000000000 R11: fffff52000861e95 R12: 0000000000000001\n R13: 1ffff92000861f00 R14: dffffc0000000000 R15: 0000000000000000\n FS: 00007f424d9fe6c0(0000) GS:ffff888125afc000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 00007fd78ad212c0 CR3: 0000000076d68000 CR4: 00000000003526f0\n Call Trace:\n \u003cTASK\u003e\n btrfs_rebuild_free_space_tree+0x1ba/0x6d0 fs/btrfs/free-space-tree.c:1364\n btrfs_start_pre_rw_mount+0x128f/0x1bf0 fs/btrfs/disk-io.c:3062\n btrfs_remount_rw fs/btrfs/super.c:1334 [inline]\n btrfs_reconfigure+0xaed/0x2160 fs/btrfs/super.c:1559\n reconfigure_super+0x227/0x890 fs/super.c:1076\n do_remount fs/namespace.c:3279 [inline]\n path_mount+0xd1a/0xfe0 fs/namespace.c:4027\n do_mount fs/namespace.c:4048 [inline]\n __do_sys_mount fs/namespace.c:4236 [inline]\n __se_sys_mount+0x313/0x410 fs/namespace.c:4213\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xfa/0xfa0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n RIP: 0033:0x7f424e39066a\n Code: d8 64 89 02 (...)\n RSP: 002b:00007f424d9fde68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5\n RAX: ffffffffffffffda RBX: 00007f424d9fdef0 RCX: 00007f424e39066a\n RDX: 0000200000000180 RSI: 0000200000000380 RDI: 0000000000000000\n RBP: 0000200000000180 R08: 00007f424d9fdef0 R09: 0000000000000020\n R10: 0000000000000020 R11: 0000000000000246 R12: 0000200000000380\n R13: 00007f424d9fdeb0 R14: 0000000000000000 R15: 00002000000002c0\n \u003c/TASK\u003e\n Modules linked in:\n ---[ end trace 0000000000000000 ]---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40100",
"url": "https://www.suse.com/security/cve/CVE-2025-40100"
},
{
"category": "external",
"summary": "SUSE Bug 1252918 for CVE-2025-40100",
"url": "https://bugzilla.suse.com/1252918"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40100"
},
{
"cve": "CVE-2025-40101",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40101"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix memory leaks when rejecting a non SINGLE data profile without an RST\n\nAt the end of btrfs_load_block_group_zone_info() the first thing we do\nis to ensure that if the mapping type is not a SINGLE one and there is\nno RAID stripe tree, then we return early with an error.\n\nDoing that, though, prevents the code from running the last calls from\nthis function which are about freeing memory allocated during its\nrun. Hence, in this case, instead of returning early, we set the ret\nvalue and fall through the rest of the cleanup code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40101",
"url": "https://www.suse.com/security/cve/CVE-2025-40101"
},
{
"category": "external",
"summary": "SUSE Bug 1252901 for CVE-2025-40101",
"url": "https://bugzilla.suse.com/1252901"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2025-40101"
},
{
"cve": "CVE-2025-40102",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40102"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: arm64: Prevent access to vCPU events before init\n\nAnother day, another syzkaller bug. KVM erroneously allows userspace to\npend vCPU events for a vCPU that hasn\u0027t been initialized yet, leading to\nKVM interpreting a bunch of uninitialized garbage for routing /\ninjecting the exception.\n\nIn one case the injection code and the hyp disagree on whether the vCPU\nhas a 32bit EL1 and put the vCPU into an illegal mode for AArch64,\ntripping the BUG() in exception_target_el() during the next injection:\n\n kernel BUG at arch/arm64/kvm/inject_fault.c:40!\n Internal error: Oops - BUG: 00000000f2000800 [#1] SMP\n CPU: 3 UID: 0 PID: 318 Comm: repro Not tainted 6.17.0-rc4-00104-g10fd0285305d #6 PREEMPT\n Hardware name: linux,dummy-virt (DT)\n pstate: 21402009 (nzCv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--)\n pc : exception_target_el+0x88/0x8c\n lr : pend_serror_exception+0x18/0x13c\n sp : ffff800082f03a10\n x29: ffff800082f03a10 x28: ffff0000cb132280 x27: 0000000000000000\n x26: 0000000000000000 x25: ffff0000c2a99c20 x24: 0000000000000000\n x23: 0000000000008000 x22: 0000000000000002 x21: 0000000000000004\n x20: 0000000000008000 x19: ffff0000c2a99c20 x18: 0000000000000000\n x17: 0000000000000000 x16: 0000000000000000 x15: 00000000200000c0\n x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000\n x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000\n x8 : ffff800082f03af8 x7 : 0000000000000000 x6 : 0000000000000000\n x5 : ffff800080f621f0 x4 : 0000000000000000 x3 : 0000000000000000\n x2 : 000000000040009b x1 : 0000000000000003 x0 : ffff0000c2a99c20\n Call trace:\n exception_target_el+0x88/0x8c (P)\n kvm_inject_serror_esr+0x40/0x3b4\n __kvm_arm_vcpu_set_events+0xf0/0x100\n kvm_arch_vcpu_ioctl+0x180/0x9d4\n kvm_vcpu_ioctl+0x60c/0x9f4\n __arm64_sys_ioctl+0xac/0x104\n invoke_syscall+0x48/0x110\n el0_svc_common.constprop.0+0x40/0xe0\n do_el0_svc+0x1c/0x28\n el0_svc+0x34/0xf0\n el0t_64_sync_handler+0xa0/0xe4\n el0t_64_sync+0x198/0x19c\n Code: f946bc01 b4fffe61 9101e020 17fffff2 (d4210000)\n\nReject the ioctls outright as no sane VMM would call these before\nKVM_ARM_VCPU_INIT anyway. Even if it did the exception would\u0027ve been\nthrown away by the eventual reset of the vCPU\u0027s state.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40102",
"url": "https://www.suse.com/security/cve/CVE-2025-40102"
},
{
"category": "external",
"summary": "SUSE Bug 1252919 for CVE-2025-40102",
"url": "https://bugzilla.suse.com/1252919"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40102"
},
{
"cve": "CVE-2025-40103",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40103"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: Fix refcount leak for cifs_sb_tlink\n\nFix three refcount inconsistency issues related to `cifs_sb_tlink`.\n\nComments for `cifs_sb_tlink` state that `cifs_put_tlink()` needs to be\ncalled after successful calls to `cifs_sb_tlink()`. Three calls fail to\nupdate refcount accordingly, leading to possible resource leaks.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40103",
"url": "https://www.suse.com/security/cve/CVE-2025-40103"
},
{
"category": "external",
"summary": "SUSE Bug 1252924 for CVE-2025-40103",
"url": "https://bugzilla.suse.com/1252924"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2025-40103"
},
{
"cve": "CVE-2025-40104",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40104"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nixgbevf: fix mailbox API compatibility by negotiating supported features\n\nThere was backward compatibility in the terms of mailbox API. Various\ndrivers from various OSes supporting 10G adapters from Intel portfolio\ncould easily negotiate mailbox API.\n\nThis convention has been broken since introducing API 1.4.\nCommit 0062e7cc955e (\"ixgbevf: add VF IPsec offload code\") added support\nfor IPSec which is specific only for the kernel ixgbe driver. None of the\nrest of the Intel 10G PF/VF drivers supports it. And actually lack of\nsupport was not included in the IPSec implementation - there were no such\ncode paths. No possibility to negotiate support for the feature was\nintroduced along with introduction of the feature itself.\n\nCommit 339f28964147 (\"ixgbevf: Add support for new mailbox communication\nbetween PF and VF\") increasing API version to 1.5 did the same - it\nintroduced code supported specifically by the PF ESX driver. It altered API\nversion for the VF driver in the same time not touching the version\ndefined for the PF ixgbe driver. It led to additional discrepancies,\nas the code provided within API 1.6 cannot be supported for Linux ixgbe\ndriver as it causes crashes.\n\nThe issue was noticed some time ago and mitigated by Jake within the commit\nd0725312adf5 (\"ixgbevf: stop attempting IPSEC offload on Mailbox API 1.5\").\nAs a result we have regression for IPsec support and after increasing API\nto version 1.6 ixgbevf driver stopped to support ESX MBX.\n\nTo fix this mess add new mailbox op asking PF driver about supported\nfeatures. Basing on a response determine whether to set support for IPSec\nand ESX-specific enhanced mailbox.\n\nNew mailbox op, for compatibility purposes, must be added within new API\nrevision, as API version of OOT PF \u0026 VF drivers is already increased to\n1.6 and doesn\u0027t incorporate features negotiate op.\n\nFeatures negotiation mechanism gives possibility to be extended with new\nfeatures when needed in the future.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40104",
"url": "https://www.suse.com/security/cve/CVE-2025-40104"
},
{
"category": "external",
"summary": "SUSE Bug 1252921 for CVE-2025-40104",
"url": "https://bugzilla.suse.com/1252921"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40104"
},
{
"cve": "CVE-2025-40105",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40105"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvfs: Don\u0027t leak disconnected dentries on umount\n\nWhen user calls open_by_handle_at() on some inode that is not cached, we\nwill create disconnected dentry for it. If such dentry is a directory,\nexportfs_decode_fh_raw() will then try to connect this dentry to the\ndentry tree through reconnect_path(). It may happen for various reasons\n(such as corrupted fs or race with rename) that the call to\nlookup_one_unlocked() in reconnect_one() will fail to find the dentry we\nare trying to reconnect and instead create a new dentry under the\nparent. Now this dentry will not be marked as disconnected although the\nparent still may well be disconnected (at least in case this\ninconsistency happened because the fs is corrupted and .. doesn\u0027t point\nto the real parent directory). This creates inconsistency in\ndisconnected flags but AFAICS it was mostly harmless. At least until\ncommit f1ee616214cb (\"VFS: don\u0027t keep disconnected dentries on d_anon\")\nwhich removed adding of most disconnected dentries to sb-\u003es_anon list.\nThus after this commit cleanup of disconnected dentries implicitely\nrelies on the fact that dput() will immediately reclaim such dentries.\nHowever when some leaf dentry isn\u0027t marked as disconnected, as in the\nscenario described above, the reclaim doesn\u0027t happen and the dentries\nare \"leaked\". Memory reclaim can eventually reclaim them but otherwise\nthey stay in memory and if umount comes first, we hit infamous \"Busy\ninodes after unmount\" bug. Make sure all dentries created under a\ndisconnected parent are marked as disconnected as well.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40105",
"url": "https://www.suse.com/security/cve/CVE-2025-40105"
},
{
"category": "external",
"summary": "SUSE Bug 1252928 for CVE-2025-40105",
"url": "https://bugzilla.suse.com/1252928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2025-40105"
},
{
"cve": "CVE-2025-40106",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40106"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncomedi: fix divide-by-zero in comedi_buf_munge()\n\nThe comedi_buf_munge() function performs a modulo operation\n`async-\u003emunge_chan %= async-\u003ecmd.chanlist_len` without first\nchecking if chanlist_len is zero. If a user program submits a command with\nchanlist_len set to zero, this causes a divide-by-zero error when the device\nprocesses data in the interrupt handler path.\n\nAdd a check for zero chanlist_len at the beginning of the\nfunction, similar to the existing checks for !map and\nCMDF_RAWDATA flag. When chanlist_len is zero, update\nmunge_count and return early, indicating the data was\nhandled without munging.\n\nThis prevents potential kernel panics from malformed user commands.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40106",
"url": "https://www.suse.com/security/cve/CVE-2025-40106"
},
{
"category": "external",
"summary": "SUSE Bug 1252891 for CVE-2025-40106",
"url": "https://bugzilla.suse.com/1252891"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40106"
},
{
"cve": "CVE-2025-40300",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40300"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/vmscape: Add conditional IBPB mitigation\n\nVMSCAPE is a vulnerability that exploits insufficient branch predictor\nisolation between a guest and a userspace hypervisor (like QEMU). Existing\nmitigations already protect kernel/KVM from a malicious guest. Userspace\ncan additionally be protected by flushing the branch predictors after a\nVMexit.\n\nSince it is the userspace that consumes the poisoned branch predictors,\nconditionally issue an IBPB after a VMexit and before returning to\nuserspace. Workloads that frequently switch between hypervisor and\nuserspace will incur the most overhead from the new IBPB.\n\nThis new IBPB is not integrated with the existing IBPB sites. For\ninstance, a task can use the existing speculation control prctl() to\nget an IBPB at context switch time. With this implementation, the\nIBPB is doubled up: one at context switch and another before running\nuserspace.\n\nThe intent is to integrate and optimize these cases post-embargo.\n\n[ dhansen: elaborate on suboptimal IBPB solution ]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40300",
"url": "https://www.suse.com/security/cve/CVE-2025-40300"
},
{
"category": "external",
"summary": "SUSE Bug 1249561 for CVE-2025-40300",
"url": "https://bugzilla.suse.com/1249561"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40300"
},
{
"cve": "CVE-2025-68254",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68254"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nstaging: rtl8723bs: fix out-of-bounds read in OnBeacon ESR IE parsing\n\nThe Extended Supported Rates (ESR) IE handling in OnBeacon accessed\n*(p + 1 + ielen) and *(p + 2 + ielen) without verifying that these\noffsets lie within the received frame buffer. A malformed beacon with\nan ESR IE positioned at the end of the buffer could cause an\nout-of-bounds read, potentially triggering a kernel panic.\n\nAdd a boundary check to ensure that the ESR IE body and the subsequent\nbytes are within the limits of the frame before attempting to access\nthem.\n\nThis prevents OOB reads caused by malformed beacon frames.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68254",
"url": "https://www.suse.com/security/cve/CVE-2025-68254"
},
{
"category": "external",
"summary": "SUSE Bug 1255140 for CVE-2025-68254",
"url": "https://bugzilla.suse.com/1255140"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-68254"
},
{
"cve": "CVE-2025-68255",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68255"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nstaging: rtl8723bs: fix stack buffer overflow in OnAssocReq IE parsing\n\nThe Supported Rates IE length from an incoming Association Request frame\nwas used directly as the memcpy() length when copying into a fixed-size\n16-byte stack buffer (supportRate). A malicious station can advertise an\nIE length larger than 16 bytes, causing a stack buffer overflow.\n\nClamp ie_len to the buffer size before copying the Supported Rates IE,\nand correct the bounds check when merging Extended Supported Rates to\nprevent a second potential overflow.\n\nThis prevents kernel stack corruption triggered by malformed association\nrequests.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68255",
"url": "https://www.suse.com/security/cve/CVE-2025-68255"
},
{
"category": "external",
"summary": "SUSE Bug 1255395 for CVE-2025-68255",
"url": "https://bugzilla.suse.com/1255395"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-68255"
},
{
"cve": "CVE-2025-68256",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68256"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nstaging: rtl8723bs: fix out-of-bounds read in rtw_get_ie() parser\n\nThe Information Element (IE) parser rtw_get_ie() trusted the length\nbyte of each IE without validating that the IE body (len bytes after\nthe 2-byte header) fits inside the remaining frame buffer. A malformed\nframe can advertise an IE length larger than the available data, causing\nthe parser to increment its pointer beyond the buffer end. This results\nin out-of-bounds reads or, depending on the pattern, an infinite loop.\n\nFix by validating that (offset + 2 + len) does not exceed the limit\nbefore accepting the IE or advancing to the next element.\n\nThis prevents OOB reads and ensures the parser terminates safely on\nmalformed frames.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68256",
"url": "https://www.suse.com/security/cve/CVE-2025-68256"
},
{
"category": "external",
"summary": "SUSE Bug 1255138 for CVE-2025-68256",
"url": "https://bugzilla.suse.com/1255138"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-68256"
},
{
"cve": "CVE-2025-68257",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68257"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncomedi: check device\u0027s attached status in compat ioctls\n\nSyzbot identified an issue [1] that crashes kernel, seemingly due to\nunexistent callback dev-\u003eget_valid_routes(). By all means, this should\nnot occur as said callback must always be set to\nget_zero_valid_routes() in __comedi_device_postconfig().\n\nAs the crash seems to appear exclusively in i386 kernels, at least,\njudging from [1] reports, the blame lies with compat versions\nof standard IOCTL handlers. Several of them are modified and\ndo not use comedi_unlocked_ioctl(). While functionality of these\nioctls essentially copy their original versions, they do not\nhave required sanity check for device\u0027s attached status. This,\nin turn, leads to a possibility of calling select IOCTLs on a\ndevice that has not been properly setup, even via COMEDI_DEVCONFIG.\n\nDoing so on unconfigured devices means that several crucial steps\nare missed, for instance, specifying dev-\u003eget_valid_routes()\ncallback.\n\nFix this somewhat crudely by ensuring device\u0027s attached status before\nperforming any ioctls, improving logic consistency between modern\nand compat functions.\n\n[1] Syzbot report:\nBUG: kernel NULL pointer dereference, address: 0000000000000000\n...\nCR2: ffffffffffffffd6 CR3: 000000006c717000 CR4: 0000000000352ef0\nCall Trace:\n \u003cTASK\u003e\n get_valid_routes drivers/comedi/comedi_fops.c:1322 [inline]\n parse_insn+0x78c/0x1970 drivers/comedi/comedi_fops.c:1401\n do_insnlist_ioctl+0x272/0x700 drivers/comedi/comedi_fops.c:1594\n compat_insnlist drivers/comedi/comedi_fops.c:3208 [inline]\n comedi_compat_ioctl+0x810/0x990 drivers/comedi/comedi_fops.c:3273\n __do_compat_sys_ioctl fs/ioctl.c:695 [inline]\n __se_compat_sys_ioctl fs/ioctl.c:638 [inline]\n __ia32_compat_sys_ioctl+0x242/0x370 fs/ioctl.c:638\n do_syscall_32_irqs_on arch/x86/entry/syscall_32.c:83 [inline]\n...",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68257",
"url": "https://www.suse.com/security/cve/CVE-2025-68257"
},
{
"category": "external",
"summary": "SUSE Bug 1255167 for CVE-2025-68257",
"url": "https://bugzilla.suse.com/1255167"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-68257"
},
{
"cve": "CVE-2025-68258",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68258"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncomedi: multiq3: sanitize config options in multiq3_attach()\n\nSyzbot identified an issue [1] in multiq3_attach() that induces a\ntask timeout due to open() or COMEDI_DEVCONFIG ioctl operations,\nspecifically, in the case of multiq3 driver.\n\nThis problem arose when syzkaller managed to craft weird configuration\noptions used to specify the number of channels in encoder subdevice.\nIf a particularly great number is passed to s-\u003en_chan in\nmultiq3_attach() via it-\u003eoptions[2], then multiple calls to\nmultiq3_encoder_reset() at the end of driver-specific attach() method\nwill be running for minutes, thus blocking tasks and affected devices\nas well.\n\nWhile this issue is most likely not too dangerous for real-life\ndevices, it still makes sense to sanitize configuration inputs. Enable\na sensible limit on the number of encoder chips (4 chips max, each\nwith 2 channels) to stop this behaviour from manifesting.\n\n[1] Syzbot crash:\nINFO: task syz.2.19:6067 blocked for more than 143 seconds.\n...\nCall Trace:\n \u003cTASK\u003e\n context_switch kernel/sched/core.c:5254 [inline]\n __schedule+0x17c4/0x4d60 kernel/sched/core.c:6862\n __schedule_loop kernel/sched/core.c:6944 [inline]\n schedule+0x165/0x360 kernel/sched/core.c:6959\n schedule_preempt_disabled+0x13/0x30 kernel/sched/core.c:7016\n __mutex_lock_common kernel/locking/mutex.c:676 [inline]\n __mutex_lock+0x7e6/0x1350 kernel/locking/mutex.c:760\n comedi_open+0xc0/0x590 drivers/comedi/comedi_fops.c:2868\n chrdev_open+0x4cc/0x5e0 fs/char_dev.c:414\n do_dentry_open+0x953/0x13f0 fs/open.c:965\n vfs_open+0x3b/0x340 fs/open.c:1097\n...",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68258",
"url": "https://www.suse.com/security/cve/CVE-2025-68258"
},
{
"category": "external",
"summary": "SUSE Bug 1255182 for CVE-2025-68258",
"url": "https://bugzilla.suse.com/1255182"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-68258"
},
{
"cve": "CVE-2025-68259",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68259"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: SVM: Don\u0027t skip unrelated instruction if INT3/INTO is replaced\n\nWhen re-injecting a soft interrupt from an INT3, INT0, or (select) INTn\ninstruction, discard the exception and retry the instruction if the code\nstream is changed (e.g. by a different vCPU) between when the CPU\nexecutes the instruction and when KVM decodes the instruction to get the\nnext RIP.\n\nAs effectively predicted by commit 6ef88d6e36c2 (\"KVM: SVM: Re-inject\nINT3/INTO instead of retrying the instruction\"), failure to verify that\nthe correct INTn instruction was decoded can effectively clobber guest\nstate due to decoding the wrong instruction and thus specifying the\nwrong next RIP.\n\nThe bug most often manifests as \"Oops: int3\" panics on static branch\nchecks in Linux guests. Enabling or disabling a static branch in Linux\nuses the kernel\u0027s \"text poke\" code patching mechanism. To modify code\nwhile other CPUs may be executing that code, Linux (temporarily)\nreplaces the first byte of the original instruction with an int3 (opcode\n0xcc), then patches in the new code stream except for the first byte,\nand finally replaces the int3 with the first byte of the new code\nstream. If a CPU hits the int3, i.e. executes the code while it\u0027s being\nmodified, then the guest kernel must look up the RIP to determine how to\nhandle the #BP, e.g. by emulating the new instruction. If the RIP is\nincorrect, then this lookup fails and the guest kernel panics.\n\nThe bug reproduces almost instantly by hacking the guest kernel to\nrepeatedly check a static branch[1] while running a drgn script[2] on\nthe host to constantly swap out the memory containing the guest\u0027s TSS.\n\n[1]: https://gist.github.com/osandov/44d17c51c28c0ac998ea0334edf90b5a\n[2]: https://gist.github.com/osandov/10e45e45afa29b11e0c7209247afc00b",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68259",
"url": "https://www.suse.com/security/cve/CVE-2025-68259"
},
{
"category": "external",
"summary": "SUSE Bug 1255199 for CVE-2025-68259",
"url": "https://bugzilla.suse.com/1255199"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-68259"
},
{
"cve": "CVE-2025-68260",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68260"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nrust_binder: fix race condition on death_list\n\nRust Binder contains the following unsafe operation:\n\n\t// SAFETY: A `NodeDeath` is never inserted into the death list\n\t// of any node other than its owner, so it is either in this\n\t// death list or in no death list.\n\tunsafe { node_inner.death_list.remove(self) };\n\nThis operation is unsafe because when touching the prev/next pointers of\na list element, we have to ensure that no other thread is also touching\nthem in parallel. If the node is present in the list that `remove` is\ncalled on, then that is fine because we have exclusive access to that\nlist. If the node is not in any list, then it\u0027s also ok. But if it\u0027s\npresent in a different list that may be accessed in parallel, then that\nmay be a data race on the prev/next pointers.\n\nAnd unfortunately that is exactly what is happening here. In\nNode::release, we:\n\n 1. Take the lock.\n 2. Move all items to a local list on the stack.\n 3. Drop the lock.\n 4. Iterate the local list on the stack.\n\nCombined with threads using the unsafe remove method on the original\nlist, this leads to memory corruption of the prev/next pointers. This\nleads to crashes like this one:\n\n\tUnable to handle kernel paging request at virtual address 000bb9841bcac70e\n\tMem abort info:\n\t ESR = 0x0000000096000044\n\t EC = 0x25: DABT (current EL), IL = 32 bits\n\t SET = 0, FnV = 0\n\t EA = 0, S1PTW = 0\n\t FSC = 0x04: level 0 translation fault\n\tData abort info:\n\t ISV = 0, ISS = 0x00000044, ISS2 = 0x00000000\n\t CM = 0, WnR = 1, TnD = 0, TagAccess = 0\n\t GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0\n\t[000bb9841bcac70e] address between user and kernel address ranges\n\tInternal error: Oops: 0000000096000044 [#1] PREEMPT SMP\n\tgoogle-cdd 538c004.gcdd: context saved(CPU:1)\n\titem - log_kevents is disabled\n\tModules linked in: ... rust_binder\n\tCPU: 1 UID: 0 PID: 2092 Comm: kworker/1:178 Tainted: G S W OE 6.12.52-android16-5-g98debd5df505-4k #1 f94a6367396c5488d635708e43ee0c888d230b0b\n\tTainted: [S]=CPU_OUT_OF_SPEC, [W]=WARN, [O]=OOT_MODULE, [E]=UNSIGNED_MODULE\n\tHardware name: MUSTANG PVT 1.0 based on LGA (DT)\n\tWorkqueue: events _RNvXs6_NtCsdfZWD8DztAw_6kernel9workqueueINtNtNtB7_4sync3arc3ArcNtNtCs8QPsHWIn21X_16rust_binder_main7process7ProcessEINtB5_15WorkItemPointerKy0_E3runB13_ [rust_binder]\n\tpstate: 23400005 (nzCv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--)\n\tpc : _RNvXs3_NtCs8QPsHWIn21X_16rust_binder_main7processNtB5_7ProcessNtNtCsdfZWD8DztAw_6kernel9workqueue8WorkItem3run+0x450/0x11f8 [rust_binder]\n\tlr : _RNvXs3_NtCs8QPsHWIn21X_16rust_binder_main7processNtB5_7ProcessNtNtCsdfZWD8DztAw_6kernel9workqueue8WorkItem3run+0x464/0x11f8 [rust_binder]\n\tsp : ffffffc09b433ac0\n\tx29: ffffffc09b433d30 x28: ffffff8821690000 x27: ffffffd40cbaa448\n\tx26: ffffff8821690000 x25: 00000000ffffffff x24: ffffff88d0376578\n\tx23: 0000000000000001 x22: ffffffc09b433c78 x21: ffffff88e8f9bf40\n\tx20: ffffff88e8f9bf40 x19: ffffff882692b000 x18: ffffffd40f10bf00\n\tx17: 00000000c006287d x16: 00000000c006287d x15: 00000000000003b0\n\tx14: 0000000000000100 x13: 000000201cb79ae0 x12: fffffffffffffff0\n\tx11: 0000000000000000 x10: 0000000000000001 x9 : 0000000000000000\n\tx8 : b80bb9841bcac706 x7 : 0000000000000001 x6 : fffffffebee63f30\n\tx5 : 0000000000000000 x4 : 0000000000000001 x3 : 0000000000000000\n\tx2 : 0000000000004c31 x1 : ffffff88216900c0 x0 : ffffff88e8f9bf00\n\tCall trace:\n\t _RNvXs3_NtCs8QPsHWIn21X_16rust_binder_main7processNtB5_7ProcessNtNtCsdfZWD8DztAw_6kernel9workqueue8WorkItem3run+0x450/0x11f8 [rust_binder bbc172b53665bbc815363b22e97e3f7e3fe971fc]\n\t process_scheduled_works+0x1c4/0x45c\n\t worker_thread+0x32c/0x3e8\n\t kthread+0x11c/0x1c8\n\t ret_from_fork+0x10/0x20\n\tCode: 94218d85 b4000155 a94026a8 d10102a0 (f9000509)\n\t---[ end trace 0000000000000000 ]---\n\nThus, modify Node::release to pop items directly off the original list.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68260",
"url": "https://www.suse.com/security/cve/CVE-2025-68260"
},
{
"category": "external",
"summary": "SUSE Bug 1255177 for CVE-2025-68260",
"url": "https://bugzilla.suse.com/1255177"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-68260"
},
{
"cve": "CVE-2025-68261",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68261"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: add i_data_sem protection in ext4_destroy_inline_data_nolock()\n\nFix a race between inline data destruction and block mapping.\n\nThe function ext4_destroy_inline_data_nolock() changes the inode data\nlayout by clearing EXT4_INODE_INLINE_DATA and setting EXT4_INODE_EXTENTS.\nAt the same time, another thread may execute ext4_map_blocks(), which\ntests EXT4_INODE_EXTENTS to decide whether to call ext4_ext_map_blocks()\nor ext4_ind_map_blocks().\n\nWithout i_data_sem protection, ext4_ind_map_blocks() may receive inode\nwith EXT4_INODE_EXTENTS flag and triggering assert.\n\nkernel BUG at fs/ext4/indirect.c:546!\nEXT4-fs (loop2): unmounting filesystem.\ninvalid opcode: 0000 [#1] PREEMPT SMP KASAN NOPTI\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014\nRIP: 0010:ext4_ind_map_blocks.cold+0x2b/0x5a fs/ext4/indirect.c:546\n\nCall Trace:\n \u003cTASK\u003e\n ext4_map_blocks+0xb9b/0x16f0 fs/ext4/inode.c:681\n _ext4_get_block+0x242/0x590 fs/ext4/inode.c:822\n ext4_block_write_begin+0x48b/0x12c0 fs/ext4/inode.c:1124\n ext4_write_begin+0x598/0xef0 fs/ext4/inode.c:1255\n ext4_da_write_begin+0x21e/0x9c0 fs/ext4/inode.c:3000\n generic_perform_write+0x259/0x5d0 mm/filemap.c:3846\n ext4_buffered_write_iter+0x15b/0x470 fs/ext4/file.c:285\n ext4_file_write_iter+0x8e0/0x17f0 fs/ext4/file.c:679\n call_write_iter include/linux/fs.h:2271 [inline]\n do_iter_readv_writev+0x212/0x3c0 fs/read_write.c:735\n do_iter_write+0x186/0x710 fs/read_write.c:861\n vfs_iter_write+0x70/0xa0 fs/read_write.c:902\n iter_file_splice_write+0x73b/0xc90 fs/splice.c:685\n do_splice_from fs/splice.c:763 [inline]\n direct_splice_actor+0x10f/0x170 fs/splice.c:950\n splice_direct_to_actor+0x33a/0xa10 fs/splice.c:896\n do_splice_direct+0x1a9/0x280 fs/splice.c:1002\n do_sendfile+0xb13/0x12c0 fs/read_write.c:1255\n __do_sys_sendfile64 fs/read_write.c:1323 [inline]\n __se_sys_sendfile64 fs/read_write.c:1309 [inline]\n __x64_sys_sendfile64+0x1cf/0x210 fs/read_write.c:1309\n do_syscall_x64 arch/x86/entry/common.c:51 [inline]\n do_syscall_64+0x35/0x80 arch/x86/entry/common.c:81\n entry_SYSCALL_64_after_hwframe+0x6e/0xd8",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68261",
"url": "https://www.suse.com/security/cve/CVE-2025-68261"
},
{
"category": "external",
"summary": "SUSE Bug 1255164 for CVE-2025-68261",
"url": "https://bugzilla.suse.com/1255164"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-68261"
},
{
"cve": "CVE-2025-68262",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68262"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: zstd - fix double-free in per-CPU stream cleanup\n\nThe crypto/zstd module has a double-free bug that occurs when multiple\ntfms are allocated and freed.\n\nThe issue happens because zstd_streams (per-CPU contexts) are freed in\nzstd_exit() during every tfm destruction, rather than being managed at\nthe module level. When multiple tfms exist, each tfm exit attempts to\nfree the same shared per-CPU streams, resulting in a double-free.\n\nThis leads to a stack trace similar to:\n\n BUG: Bad page state in process kworker/u16:1 pfn:106fd93\n page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106fd93\n flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff)\n page_type: 0xffffffff()\n raw: 0017ffffc0000000 dead000000000100 dead000000000122 0000000000000000\n raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000\n page dumped because: nonzero entire_mapcount\n Modules linked in: ...\n CPU: 3 UID: 0 PID: 2506 Comm: kworker/u16:1 Kdump: loaded Tainted: G B\n Hardware name: ...\n Workqueue: btrfs-delalloc btrfs_work_helper\n Call Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x5d/0x80\n bad_page+0x71/0xd0\n free_unref_page_prepare+0x24e/0x490\n free_unref_page+0x60/0x170\n crypto_acomp_free_streams+0x5d/0xc0\n crypto_acomp_exit_tfm+0x23/0x50\n crypto_destroy_tfm+0x60/0xc0\n ...\n\nChange the lifecycle management of zstd_streams to free the streams only\nonce during module cleanup.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68262",
"url": "https://www.suse.com/security/cve/CVE-2025-68262"
},
{
"category": "external",
"summary": "SUSE Bug 1255158 for CVE-2025-68262",
"url": "https://bugzilla.suse.com/1255158"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-68262"
},
{
"cve": "CVE-2025-68263",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68263"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nksmbd: ipc: fix use-after-free in ipc_msg_send_request\n\nipc_msg_send_request() waits for a generic netlink reply using an\nipc_msg_table_entry on the stack. The generic netlink handler\n(handle_generic_event()/handle_response()) fills entry-\u003eresponse under\nipc_msg_table_lock, but ipc_msg_send_request() used to validate and free\nentry-\u003eresponse without holding the same lock.\n\nUnder high concurrency this allows a race where handle_response() is\ncopying data into entry-\u003eresponse while ipc_msg_send_request() has just\nfreed it, leading to a slab-use-after-free reported by KASAN in\nhandle_generic_event():\n\n BUG: KASAN: slab-use-after-free in handle_generic_event+0x3c4/0x5f0 [ksmbd]\n Write of size 12 at addr ffff888198ee6e20 by task pool/109349\n ...\n Freed by task:\n kvfree\n ipc_msg_send_request [ksmbd]\n ksmbd_rpc_open -\u003e ksmbd_session_rpc_open [ksmbd]\n\nFix by:\n- Taking ipc_msg_table_lock in ipc_msg_send_request() while validating\n entry-\u003eresponse, freeing it when invalid, and removing the entry from\n ipc_msg_table.\n- Returning the final entry-\u003eresponse pointer to the caller only after\n the hash entry is removed under the lock.\n- Returning NULL in the error path, preserving the original API\n semantics.\n\nThis makes all accesses to entry-\u003eresponse consistent with\nhandle_response(), which already updates and fills the response buffer\nunder ipc_msg_table_lock, and closes the race that allowed the UAF.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68263",
"url": "https://www.suse.com/security/cve/CVE-2025-68263"
},
{
"category": "external",
"summary": "SUSE Bug 1255384 for CVE-2025-68263",
"url": "https://bugzilla.suse.com/1255384"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-68263"
},
{
"cve": "CVE-2025-68264",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68264"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: refresh inline data size before write operations\n\nThe cached ei-\u003ei_inline_size can become stale between the initial size\ncheck and when ext4_update_inline_data()/ext4_create_inline_data() use\nit. Although ext4_get_max_inline_size() reads the correct value at the\ntime of the check, concurrent xattr operations can modify i_inline_size\nbefore ext4_write_lock_xattr() is acquired.\n\nThis causes ext4_update_inline_data() and ext4_create_inline_data() to\nwork with stale capacity values, leading to a BUG_ON() crash in\next4_write_inline_data():\n\n kernel BUG at fs/ext4/inline.c:1331!\n BUG_ON(pos + len \u003e EXT4_I(inode)-\u003ei_inline_size);\n\nThe race window:\n1. ext4_get_max_inline_size() reads i_inline_size = 60 (correct)\n2. Size check passes for 50-byte write\n3. [Another thread adds xattr, i_inline_size changes to 40]\n4. ext4_write_lock_xattr() acquires lock\n5. ext4_update_inline_data() uses stale i_inline_size = 60\n6. Attempts to write 50 bytes but only 40 bytes actually available\n7. BUG_ON() triggers\n\nFix this by recalculating i_inline_size via ext4_find_inline_data_nolock()\nimmediately after acquiring xattr_sem. This ensures ext4_update_inline_data()\nand ext4_create_inline_data() work with current values that are protected\nfrom concurrent modifications.\n\nThis is similar to commit a54c4613dac1 (\"ext4: fix race writing to an\ninline_data file while its xattrs are changing\") which fixed i_inline_off\nstaleness. This patch addresses the related i_inline_size staleness issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68264",
"url": "https://www.suse.com/security/cve/CVE-2025-68264"
},
{
"category": "external",
"summary": "SUSE Bug 1255380 for CVE-2025-68264",
"url": "https://bugzilla.suse.com/1255380"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-68264"
},
{
"cve": "CVE-2025-68323",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68323"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: typec: ucsi: fix use-after-free caused by uec-\u003ework\n\nThe delayed work uec-\u003ework is scheduled in gaokun_ucsi_probe()\nbut never properly canceled in gaokun_ucsi_remove(). This creates\nuse-after-free scenarios where the ucsi and gaokun_ucsi structure\nare freed after ucsi_destroy() completes execution, while the\ngaokun_ucsi_register_worker() might be either currently executing\nor still pending in the work queue. The already-freed gaokun_ucsi\nor ucsi structure may then be accessed.\n\nFurthermore, the race window is 3 seconds, which is sufficiently\nlong to make this bug easily reproducible. The following is the\ntrace captured by KASAN:\n\n==================================================================\nBUG: KASAN: slab-use-after-free in __run_timers+0x5ec/0x630\nWrite of size 8 at addr ffff00000ec28cc8 by task swapper/0/0\n...\nCall trace:\n show_stack+0x18/0x24 (C)\n dump_stack_lvl+0x78/0x90\n print_report+0x114/0x580\n kasan_report+0xa4/0xf0\n __asan_report_store8_noabort+0x20/0x2c\n __run_timers+0x5ec/0x630\n run_timer_softirq+0xe8/0x1cc\n handle_softirqs+0x294/0x720\n __do_softirq+0x14/0x20\n ____do_softirq+0x10/0x1c\n call_on_irq_stack+0x30/0x48\n do_softirq_own_stack+0x1c/0x28\n __irq_exit_rcu+0x27c/0x364\n irq_exit_rcu+0x10/0x1c\n el1_interrupt+0x40/0x60\n el1h_64_irq_handler+0x18/0x24\n el1h_64_irq+0x6c/0x70\n arch_local_irq_enable+0x4/0x8 (P)\n do_idle+0x334/0x458\n cpu_startup_entry+0x60/0x70\n rest_init+0x158/0x174\n start_kernel+0x2f8/0x394\n __primary_switched+0x8c/0x94\n\nAllocated by task 72 on cpu 0 at 27.510341s:\n kasan_save_stack+0x2c/0x54\n kasan_save_track+0x24/0x5c\n kasan_save_alloc_info+0x40/0x54\n __kasan_kmalloc+0xa0/0xb8\n __kmalloc_node_track_caller_noprof+0x1c0/0x588\n devm_kmalloc+0x7c/0x1c8\n gaokun_ucsi_probe+0xa0/0x840 auxiliary_bus_probe+0x94/0xf8\n really_probe+0x17c/0x5b8\n __driver_probe_device+0x158/0x2c4\n driver_probe_device+0x10c/0x264\n __device_attach_driver+0x168/0x2d0\n bus_for_each_drv+0x100/0x188\n __device_attach+0x174/0x368\n device_initial_probe+0x14/0x20\n bus_probe_device+0x120/0x150\n device_add+0xb3c/0x10fc\n __auxiliary_device_add+0x88/0x130\n...\n\nFreed by task 73 on cpu 1 at 28.910627s:\n kasan_save_stack+0x2c/0x54\n kasan_save_track+0x24/0x5c\n __kasan_save_free_info+0x4c/0x74\n __kasan_slab_free+0x60/0x8c\n kfree+0xd4/0x410\n devres_release_all+0x140/0x1f0\n device_unbind_cleanup+0x20/0x190\n device_release_driver_internal+0x344/0x460\n device_release_driver+0x18/0x24\n bus_remove_device+0x198/0x274\n device_del+0x310/0xa84\n...\n\nThe buggy address belongs to the object at ffff00000ec28c00\n which belongs to the cache kmalloc-512 of size 512\nThe buggy address is located 200 bytes inside of\n freed 512-byte region\nThe buggy address belongs to the physical page:\npage: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x4ec28\nhead: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0\nflags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff)\npage_type: f5(slab)\nraw: 03fffe0000000040 ffff000008801c80 dead000000000122 0000000000000000\nraw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000\nhead: 03fffe0000000040 ffff000008801c80 dead000000000122 0000000000000000\nhead: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000\nhead: 03fffe0000000002 fffffdffc03b0a01 00000000ffffffff 00000000ffffffff\nhead: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004\npage dumped because: kasan: bad access detected\n\nMemory state around the buggy address:\n ffff00000ec28b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n ffff00000ec28c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n\u003effff00000ec28c80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n ^\n ffff00000ec28d00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n ffff00000ec28d80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n================================================================\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68323",
"url": "https://www.suse.com/security/cve/CVE-2025-68323"
},
{
"category": "external",
"summary": "SUSE Bug 1255405 for CVE-2025-68323",
"url": "https://bugzilla.suse.com/1255405"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-68323"
},
{
"cve": "CVE-2025-68324",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68324"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: imm: Fix use-after-free bug caused by unfinished delayed work\n\nThe delayed work item \u0027imm_tq\u0027 is initialized in imm_attach() and\nscheduled via imm_queuecommand() for processing SCSI commands. When the\nIMM parallel port SCSI host adapter is detached through imm_detach(),\nthe imm_struct device instance is deallocated.\n\nHowever, the delayed work might still be pending or executing\nwhen imm_detach() is called, leading to use-after-free bugs\nwhen the work function imm_interrupt() accesses the already\nfreed imm_struct memory.\n\nThe race condition can occur as follows:\n\nCPU 0(detach thread) | CPU 1\n | imm_queuecommand()\n | imm_queuecommand_lck()\nimm_detach() | schedule_delayed_work()\n kfree(dev) //FREE | imm_interrupt()\n | dev = container_of(...) //USE\n dev-\u003e //USE\n\nAdd disable_delayed_work_sync() in imm_detach() to guarantee proper\ncancellation of the delayed work item before imm_struct is deallocated.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68324",
"url": "https://www.suse.com/security/cve/CVE-2025-68324"
},
{
"category": "external",
"summary": "SUSE Bug 1255416 for CVE-2025-68324",
"url": "https://bugzilla.suse.com/1255416"
},
{
"category": "external",
"summary": "SUSE Bug 1257117 for CVE-2025-68324",
"url": "https://bugzilla.suse.com/1257117"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-68324"
},
{
"cve": "CVE-2025-68325",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68325"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: sch_cake: Fix incorrect qlen reduction in cake_drop\n\nIn cake_drop(), qdisc_tree_reduce_backlog() is used to update the qlen\nand backlog of the qdisc hierarchy. Its caller, cake_enqueue(), assumes\nthat the parent qdisc will enqueue the current packet. However, this\nassumption breaks when cake_enqueue() returns NET_XMIT_CN: the parent\nqdisc stops enqueuing current packet, leaving the tree qlen/backlog\naccounting inconsistent. This mismatch can lead to a NULL dereference\n(e.g., when the parent Qdisc is qfq_qdisc).\n\nThis patch computes the qlen/backlog delta in a more robust way by\nobserving the difference before and after the series of cake_drop()\ncalls, and then compensates the qdisc tree accounting if cake_enqueue()\nreturns NET_XMIT_CN.\n\nTo ensure correct compensation when ACK thinning is enabled, a new\nvariable is introduced to keep qlen unchanged.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68325",
"url": "https://www.suse.com/security/cve/CVE-2025-68325"
},
{
"category": "external",
"summary": "SUSE Bug 1255417 for CVE-2025-68325",
"url": "https://bugzilla.suse.com/1255417"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-68325"
},
{
"cve": "CVE-2025-68332",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68332"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncomedi: c6xdigio: Fix invalid PNP driver unregistration\n\nThe Comedi low-level driver \"c6xdigio\" seems to be for a parallel port\nconnected device. When the Comedi core calls the driver\u0027s Comedi\n\"attach\" handler `c6xdigio_attach()` to configure a Comedi to use this\ndriver, it tries to enable the parallel port PNP resources by\nregistering a PNP driver with `pnp_register_driver()`, but ignores the\nreturn value. (The `struct pnp_driver` it uses has only the `name` and\n`id_table` members filled in.) The driver\u0027s Comedi \"detach\" handler\n`c6xdigio_detach()` unconditionally unregisters the PNP driver with\n`pnp_unregister_driver()`.\n\nIt is possible for `c6xdigio_attach()` to return an error before it\ncalls `pnp_register_driver()` and it is possible for the call to\n`pnp_register_driver()` to return an error (that is ignored). In both\ncases, the driver should not be calling `pnp_unregister_driver()` as it\ndoes in `c6xdigio_detach()`. (Note that `c6xdigio_detach()` will be\ncalled by the Comedi core if `c6xdigio_attach()` returns an error, or if\nthe Comedi core decides to detach the Comedi device from the driver for\nsome other reason.)\n\nThe unconditional call to `pnp_unregister_driver()` without a previous\nsuccessful call to `pnp_register_driver()` will cause\n`driver_unregister()` to issue a warning \"Unexpected driver\nunregister!\". This was detected by Syzbot [1].\n\nAlso, the PNP driver registration and unregistration should be done at\nmodule init and exit time, respectively, not when attaching or detaching\nComedi devices to the driver. (There might be more than one Comedi\ndevice being attached to the driver, although that is unlikely.)\n\nChange the driver to do the PNP driver registration at module init time,\nand the unregistration at module exit time. Since `c6xdigio_detach()`\nnow only calls `comedi_legacy_detach()`, remove the function and change\nthe Comedi driver \"detach\" handler to `comedi_legacy_detach`.\n\n-------------------------------------------\n[1] Syzbot sample crash report:\nUnexpected driver unregister!\nWARNING: CPU: 0 PID: 5970 at drivers/base/driver.c:273 driver_unregister drivers/base/driver.c:273 [inline]\nWARNING: CPU: 0 PID: 5970 at drivers/base/driver.c:273 driver_unregister+0x90/0xb0 drivers/base/driver.c:270\nModules linked in:\nCPU: 0 UID: 0 PID: 5970 Comm: syz.0.17 Not tainted syzkaller #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025\nRIP: 0010:driver_unregister drivers/base/driver.c:273 [inline]\nRIP: 0010:driver_unregister+0x90/0xb0 drivers/base/driver.c:270\nCode: 48 89 ef e8 c2 e6 82 fc 48 89 df e8 3a 93 ff ff 5b 5d e9 c3 6d d9 fb e8 be 6d d9 fb 90 48 c7 c7 e0 f8 1f 8c e8 51 a2 97 fb 90 \u003c0f\u003e 0b 90 90 5b 5d e9 a5 6d d9 fb e8 e0 f4 41 fc eb 94 e8 d9 f4 41\nRSP: 0018:ffffc9000373f9a0 EFLAGS: 00010282\nRAX: 0000000000000000 RBX: ffffffff8ff24720 RCX: ffffffff817b6ee8\nRDX: ffff88807c932480 RSI: ffffffff817b6ef5 RDI: 0000000000000001\nRBP: 0000000000000000 R08: 0000000000000001 R09: 0000000000000000\nR10: 0000000000000001 R11: 0000000000000001 R12: ffffffff8ff24660\nR13: dffffc0000000000 R14: 0000000000000000 R15: ffff88814cca0000\nFS: 000055556dab1500(0000) GS:ffff8881249d9000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 000055f77f285cd0 CR3: 000000007d871000 CR4: 00000000003526f0\nCall Trace:\n \u003cTASK\u003e\n comedi_device_detach_locked+0x12f/0xa50 drivers/comedi/drivers.c:207\n comedi_device_detach+0x67/0xb0 drivers/comedi/drivers.c:215\n comedi_device_attach+0x43d/0x900 drivers/comedi/drivers.c:1011\n do_devconfig_ioctl+0x1b1/0x710 drivers/comedi/comedi_fops.c:872\n comedi_unlocked_ioctl+0x165d/0x2f00 drivers/comedi/comedi_fops.c:2178\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:597 [inline]\n __se_sys_ioctl fs/ioctl.c:583 [inline]\n __x64_sys_ioctl+0x18e/0x210 fs/ioctl.c:583\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_sys\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68332",
"url": "https://www.suse.com/security/cve/CVE-2025-68332"
},
{
"category": "external",
"summary": "SUSE Bug 1255483 for CVE-2025-68332",
"url": "https://bugzilla.suse.com/1255483"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-68332"
},
{
"cve": "CVE-2025-68335",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68335"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncomedi: pcl818: fix null-ptr-deref in pcl818_ai_cancel()\n\nSyzbot identified an issue [1] in pcl818_ai_cancel(), which stems from\nthe fact that in case of early device detach via pcl818_detach(),\nsubdevice dev-\u003eread_subdev may not have initialized its pointer to\n\u0026struct comedi_async as intended. Thus, any such dereferencing of\n\u0026s-\u003easync-\u003ecmd will lead to general protection fault and kernel crash.\n\nMitigate this problem by removing a call to pcl818_ai_cancel() from\npcl818_detach() altogether. This way, if the subdevice setups its\nsupport for async commands, everything async-related will be\nhandled via subdevice\u0027s own -\u003ecancel() function in\ncomedi_device_detach_locked() even before pcl818_detach(). If no\nsupport for asynchronous commands is provided, there is no need\nto cancel anything either.\n\n[1] Syzbot crash:\nOops: general protection fault, probably for non-canonical address 0xdffffc0000000005: 0000 [#1] SMP KASAN PTI\nKASAN: null-ptr-deref in range [0x0000000000000028-0x000000000000002f]\nCPU: 1 UID: 0 PID: 6050 Comm: syz.0.18 Not tainted syzkaller #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025\nRIP: 0010:pcl818_ai_cancel+0x69/0x3f0 drivers/comedi/drivers/pcl818.c:762\n...\nCall Trace:\n \u003cTASK\u003e\n pcl818_detach+0x66/0xd0 drivers/comedi/drivers/pcl818.c:1115\n comedi_device_detach_locked+0x178/0x750 drivers/comedi/drivers.c:207\n do_devconfig_ioctl drivers/comedi/comedi_fops.c:848 [inline]\n comedi_unlocked_ioctl+0xcde/0x1020 drivers/comedi/comedi_fops.c:2178\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:597 [inline]\n...",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68335",
"url": "https://www.suse.com/security/cve/CVE-2025-68335"
},
{
"category": "external",
"summary": "SUSE Bug 1255480 for CVE-2025-68335",
"url": "https://bugzilla.suse.com/1255480"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-68335"
},
{
"cve": "CVE-2025-68336",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68336"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nlocking/spinlock/debug: Fix data-race in do_raw_write_lock\n\nKCSAN reports:\n\nBUG: KCSAN: data-race in do_raw_write_lock / do_raw_write_lock\n\nwrite (marked) to 0xffff800009cf504c of 4 bytes by task 1102 on cpu 1:\n do_raw_write_lock+0x120/0x204\n _raw_write_lock_irq\n do_exit\n call_usermodehelper_exec_async\n ret_from_fork\n\nread to 0xffff800009cf504c of 4 bytes by task 1103 on cpu 0:\n do_raw_write_lock+0x88/0x204\n _raw_write_lock_irq\n do_exit\n call_usermodehelper_exec_async\n ret_from_fork\n\nvalue changed: 0xffffffff -\u003e 0x00000001\n\nReported by Kernel Concurrency Sanitizer on:\nCPU: 0 PID: 1103 Comm: kworker/u4:1 6.1.111\n\nCommit 1a365e822372 (\"locking/spinlock/debug: Fix various data races\") has\nadressed most of these races, but seems to be not consistent/not complete.\n\n\u003eFrom do_raw_write_lock() only debug_write_lock_after() part has been\nconverted to WRITE_ONCE(), but not debug_write_lock_before() part.\nDo it now.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68336",
"url": "https://www.suse.com/security/cve/CVE-2025-68336"
},
{
"category": "external",
"summary": "SUSE Bug 1255481 for CVE-2025-68336",
"url": "https://bugzilla.suse.com/1255481"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-68336"
},
{
"cve": "CVE-2025-68337",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68337"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\njbd2: avoid bug_on in jbd2_journal_get_create_access() when file system corrupted\n\nThere\u0027s issue when file system corrupted:\n------------[ cut here ]------------\nkernel BUG at fs/jbd2/transaction.c:1289!\nOops: invalid opcode: 0000 [#1] SMP KASAN PTI\nCPU: 5 UID: 0 PID: 2031 Comm: mkdir Not tainted 6.18.0-rc1-next\nRIP: 0010:jbd2_journal_get_create_access+0x3b6/0x4d0\nRSP: 0018:ffff888117aafa30 EFLAGS: 00010202\nRAX: 0000000000000000 RBX: ffff88811a86b000 RCX: ffffffff89a63534\nRDX: 1ffff110200ec602 RSI: 0000000000000004 RDI: ffff888100763010\nRBP: ffff888100763000 R08: 0000000000000001 R09: ffff888100763028\nR10: 0000000000000003 R11: 0000000000000000 R12: 0000000000000000\nR13: ffff88812c432000 R14: ffff88812c608000 R15: ffff888120bfc000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007f91d6970c99 CR3: 00000001159c4000 CR4: 00000000000006f0\nCall Trace:\n \u003cTASK\u003e\n __ext4_journal_get_create_access+0x42/0x170\n ext4_getblk+0x319/0x6f0\n ext4_bread+0x11/0x100\n ext4_append+0x1e6/0x4a0\n ext4_init_new_dir+0x145/0x1d0\n ext4_mkdir+0x326/0x920\n vfs_mkdir+0x45c/0x740\n do_mkdirat+0x234/0x2f0\n __x64_sys_mkdir+0xd6/0x120\n do_syscall_64+0x5f/0xfa0\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\nThe above issue occurs with us in errors=continue mode when accompanied by\nstorage failures. There have been many inconsistencies in the file system\ndata.\nIn the case of file system data inconsistency, for example, if the block\nbitmap of a referenced block is not set, it can lead to the situation where\na block being committed is allocated and used again. As a result, the\nfollowing condition will not be satisfied then trigger BUG_ON. Of course,\nit is entirely possible to construct a problematic image that can trigger\nthis BUG_ON through specific operations. In fact, I have constructed such\nan image and easily reproduced this issue.\nTherefore, J_ASSERT() holds true only under ideal conditions, but it may\nnot necessarily be satisfied in exceptional scenarios. Using J_ASSERT()\ndirectly in abnormal situations would cause the system to crash, which is\nclearly not what we want. So here we directly trigger a JBD abort instead\nof immediately invoking BUG_ON.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68337",
"url": "https://www.suse.com/security/cve/CVE-2025-68337"
},
{
"category": "external",
"summary": "SUSE Bug 1255482 for CVE-2025-68337",
"url": "https://bugzilla.suse.com/1255482"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-68337"
},
{
"cve": "CVE-2025-68344",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68344"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: wavefront: Fix integer overflow in sample size validation\n\nThe wavefront_send_sample() function has an integer overflow issue\nwhen validating sample size. The header-\u003esize field is u32 but gets\ncast to int for comparison with dev-\u003efreemem\n\nFix by using unsigned comparison to avoid integer overflow.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68344",
"url": "https://www.suse.com/security/cve/CVE-2025-68344"
},
{
"category": "external",
"summary": "SUSE Bug 1255816 for CVE-2025-68344",
"url": "https://bugzilla.suse.com/1255816"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-68344"
},
{
"cve": "CVE-2025-68345",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68345"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_hda_read_acpi()\n\nThe acpi_get_first_physical_node() function can return NULL, in which\ncase the get_device() function also returns NULL, but this value is\nthen dereferenced without checking,so add a check to prevent a crash.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68345",
"url": "https://www.suse.com/security/cve/CVE-2025-68345"
},
{
"category": "external",
"summary": "SUSE Bug 1255601 for CVE-2025-68345",
"url": "https://bugzilla.suse.com/1255601"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-68345"
},
{
"cve": "CVE-2025-68346",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68346"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: dice: fix buffer overflow in detect_stream_formats()\n\nThe function detect_stream_formats() reads the stream_count value directly\nfrom a FireWire device without validating it. This can lead to\nout-of-bounds writes when a malicious device provides a stream_count value\ngreater than MAX_STREAMS.\n\nFix by applying the same validation to both TX and RX stream counts in\ndetect_stream_formats().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68346",
"url": "https://www.suse.com/security/cve/CVE-2025-68346"
},
{
"category": "external",
"summary": "SUSE Bug 1255603 for CVE-2025-68346",
"url": "https://bugzilla.suse.com/1255603"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-68346"
},
{
"cve": "CVE-2025-68347",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68347"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: firewire-motu: fix buffer overflow in hwdep read for DSP events\n\nThe DSP event handling code in hwdep_read() could write more bytes to\nthe user buffer than requested, when a user provides a buffer smaller\nthan the event header size (8 bytes).\n\nFix by using min_t() to clamp the copy size, This ensures we never copy\nmore than the user requested.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68347",
"url": "https://www.suse.com/security/cve/CVE-2025-68347"
},
{
"category": "external",
"summary": "SUSE Bug 1255706 for CVE-2025-68347",
"url": "https://bugzilla.suse.com/1255706"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-68347"
},
{
"cve": "CVE-2025-68348",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68348"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nblock: fix memory leak in __blkdev_issue_zero_pages\n\nMove the fatal signal check before bio_alloc() to prevent a memory\nleak when BLKDEV_ZERO_KILLABLE is set and a fatal signal is pending.\n\nPreviously, the bio was allocated before checking for a fatal signal.\nIf a signal was pending, the code would break out of the loop without\nfreeing or chaining the just-allocated bio, causing a memory leak.\n\nThis matches the pattern already used in __blkdev_issue_write_zeroes()\nwhere the signal check precedes the allocation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68348",
"url": "https://www.suse.com/security/cve/CVE-2025-68348"
},
{
"category": "external",
"summary": "SUSE Bug 1255694 for CVE-2025-68348",
"url": "https://bugzilla.suse.com/1255694"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-68348"
},
{
"cve": "CVE-2025-68349",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68349"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFSv4/pNFS: Clear NFS_INO_LAYOUTCOMMIT in pnfs_mark_layout_stateid_invalid\n\nFixes a crash when layout is null during this call stack:\n\nwrite_inode\n -\u003e nfs4_write_inode\n -\u003e pnfs_layoutcommit_inode\n\npnfs_set_layoutcommit relies on the lseg refcount to keep the layout\naround. Need to clear NFS_INO_LAYOUTCOMMIT otherwise we might attempt\nto reference a null layout.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68349",
"url": "https://www.suse.com/security/cve/CVE-2025-68349"
},
{
"category": "external",
"summary": "SUSE Bug 1255544 for CVE-2025-68349",
"url": "https://bugzilla.suse.com/1255544"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-68349"
},
{
"cve": "CVE-2025-68350",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68350"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nexfat: fix divide-by-zero in exfat_allocate_bitmap\n\nThe variable max_ra_count can be 0 in exfat_allocate_bitmap(),\nwhich causes a divide-by-zero error in the subsequent modulo operation\n(i % max_ra_count), leading to a system crash.\nWhen max_ra_count is 0, it means that readahead is not used. This patch\nload the bitmap without readahead.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68350",
"url": "https://www.suse.com/security/cve/CVE-2025-68350"
},
{
"category": "external",
"summary": "SUSE Bug 1255625 for CVE-2025-68350",
"url": "https://bugzilla.suse.com/1255625"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-68350"
},
{
"cve": "CVE-2025-68351",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68351"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nexfat: fix refcount leak in exfat_find\n\nFix refcount leaks in `exfat_find` related to `exfat_get_dentry_set`.\n\nFunction `exfat_get_dentry_set` would increase the reference counter of\n`es-\u003ebh` on success. Therefore, `exfat_put_dentry_set` must be called\nafter `exfat_get_dentry_set` to ensure refcount consistency. This patch\nrelocate two checks to avoid possible leaks.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68351",
"url": "https://www.suse.com/security/cve/CVE-2025-68351"
},
{
"category": "external",
"summary": "SUSE Bug 1255567 for CVE-2025-68351",
"url": "https://bugzilla.suse.com/1255567"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-68351"
},
{
"cve": "CVE-2025-68352",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68352"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nspi: ch341: fix out-of-bounds memory access in ch341_transfer_one\n\nDiscovered by Atuin - Automated Vulnerability Discovery Engine.\n\nThe \u0027len\u0027 variable is calculated as \u0027min(32, trans-\u003elen + 1)\u0027,\nwhich includes the 1-byte command header.\n\nWhen copying data from \u0027trans-\u003etx_buf\u0027 to \u0027ch341-\u003etx_buf + 1\u0027, using \u0027len\u0027\nas the length is incorrect because:\n\n1. It causes an out-of-bounds read from \u0027trans-\u003etx_buf\u0027 (which has size\n \u0027trans-\u003elen\u0027, i.e., \u0027len - 1\u0027 in this context).\n2. It can cause an out-of-bounds write to \u0027ch341-\u003etx_buf\u0027 if \u0027len\u0027 is\n CH341_PACKET_LENGTH (32). Writing 32 bytes to ch341-\u003etx_buf + 1\n overflows the buffer.\n\nFix this by copying \u0027len - 1\u0027 bytes.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68352",
"url": "https://www.suse.com/security/cve/CVE-2025-68352"
},
{
"category": "external",
"summary": "SUSE Bug 1255541 for CVE-2025-68352",
"url": "https://bugzilla.suse.com/1255541"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-68352"
},
{
"cve": "CVE-2025-68353",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68353"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: vxlan: prevent NULL deref in vxlan_xmit_one\n\nNeither sock4 nor sock6 pointers are guaranteed to be non-NULL in\nvxlan_xmit_one, e.g. if the iface is brought down. This can lead to the\nfollowing NULL dereference:\n\n BUG: kernel NULL pointer dereference, address: 0000000000000010\n Oops: Oops: 0000 [#1] SMP NOPTI\n RIP: 0010:vxlan_xmit_one+0xbb3/0x1580\n Call Trace:\n vxlan_xmit+0x429/0x610\n dev_hard_start_xmit+0x55/0xa0\n __dev_queue_xmit+0x6d0/0x7f0\n ip_finish_output2+0x24b/0x590\n ip_output+0x63/0x110\n\nMentioned commits changed the code path in vxlan_xmit_one and as a side\neffect the sock4/6 pointer validity checks in vxlan(6)_get_route were\nlost. Fix this by adding back checks.\n\nSince both commits being fixed were released in the same version (v6.7)\nand are strongly related, bundle the fixes in a single commit.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68353",
"url": "https://www.suse.com/security/cve/CVE-2025-68353"
},
{
"category": "external",
"summary": "SUSE Bug 1255533 for CVE-2025-68353",
"url": "https://bugzilla.suse.com/1255533"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-68353"
},
{
"cve": "CVE-2025-68354",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68354"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nregulator: core: Protect regulator_supply_alias_list with regulator_list_mutex\n\nregulator_supply_alias_list was accessed without any locking in\nregulator_supply_alias(), regulator_register_supply_alias(), and\nregulator_unregister_supply_alias(). Concurrent registration,\nunregistration and lookups can race, leading to:\n\n1 use-after-free if an alias entry is removed while being read,\n2 duplicate entries when two threads register the same alias,\n3 inconsistent alias mappings observed by consumers.\n\nProtect all traversals, insertions and deletions on\nregulator_supply_alias_list with the existing regulator_list_mutex.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68354",
"url": "https://www.suse.com/security/cve/CVE-2025-68354"
},
{
"category": "external",
"summary": "SUSE Bug 1255553 for CVE-2025-68354",
"url": "https://bugzilla.suse.com/1255553"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-68354"
},
{
"cve": "CVE-2025-68355",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68355"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix exclusive map memory leak\n\nWhen excl_prog_hash is 0 and excl_prog_hash_size is non-zero, the map also\nneeds to be freed. Otherwise, the map memory will not be reclaimed, just\nlike the memory leak problem reported by syzbot [1].\n\nsyzbot reported:\nBUG: memory leak\n backtrace (crc 7b9fb9b4):\n map_create+0x322/0x11e0 kernel/bpf/syscall.c:1512\n __sys_bpf+0x3556/0x3610 kernel/bpf/syscall.c:6131",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68355",
"url": "https://www.suse.com/security/cve/CVE-2025-68355"
},
{
"category": "external",
"summary": "SUSE Bug 1255599 for CVE-2025-68355",
"url": "https://bugzilla.suse.com/1255599"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-68355"
},
{
"cve": "CVE-2025-68356",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68356"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ngfs2: Prevent recursive memory reclaim\n\nFunction new_inode() returns a new inode with inode-\u003ei_mapping-\u003egfp_mask\nset to GFP_HIGHUSER_MOVABLE. This value includes the __GFP_FS flag, so\nallocations in that address space can recurse into filesystem memory\nreclaim. We don\u0027t want that to happen because it can consume a\nsignificant amount of stack memory.\n\nWorse than that is that it can also deadlock: for example, in several\nplaces, gfs2_unstuff_dinode() is called inside filesystem transactions.\nThis calls filemap_grab_folio(), which can allocate a new folio, which\ncan trigger memory reclaim. If memory reclaim recurses into the\nfilesystem and starts another transaction, a deadlock will ensue.\n\nTo fix these kinds of problems, prevent memory reclaim from recursing\ninto filesystem code by making sure that the gfp_mask of inode address\nspaces doesn\u0027t include __GFP_FS.\n\nThe \"meta\" and resource group address spaces were already using GFP_NOFS\nas their gfp_mask (which doesn\u0027t include __GFP_FS). The default value\nof GFP_HIGHUSER_MOVABLE is less restrictive than GFP_NOFS, though. To\navoid being overly limiting, use the default value and only knock off\nthe __GFP_FS flag. I\u0027m not sure if this will actually make a\ndifference, but it also shouldn\u0027t hurt.\n\nThis patch is loosely based on commit ad22c7a043c2 (\"xfs: prevent stack\noverflows from page cache allocation\").\n\nFixes xfstest generic/273.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68356",
"url": "https://www.suse.com/security/cve/CVE-2025-68356"
},
{
"category": "external",
"summary": "SUSE Bug 1255593 for CVE-2025-68356",
"url": "https://bugzilla.suse.com/1255593"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-68356"
},
{
"cve": "CVE-2025-68357",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68357"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\niomap: allocate s_dio_done_wq for async reads as well\n\nSince commit 222f2c7c6d14 (\"iomap: always run error completions in user\ncontext\"), read error completions are deferred to s_dio_done_wq. This\nmeans the workqueue also needs to be allocated for async reads.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68357",
"url": "https://www.suse.com/security/cve/CVE-2025-68357"
},
{
"category": "external",
"summary": "SUSE Bug 1255525 for CVE-2025-68357",
"url": "https://bugzilla.suse.com/1255525"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-68357"
},
{
"cve": "CVE-2025-68358",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68358"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix racy bitfield write in btrfs_clear_space_info_full()\n\nFrom the memory-barriers.txt document regarding memory barrier ordering\nguarantees:\n\n (*) These guarantees do not apply to bitfields, because compilers often\n generate code to modify these using non-atomic read-modify-write\n sequences. Do not attempt to use bitfields to synchronize parallel\n algorithms.\n\n (*) Even in cases where bitfields are protected by locks, all fields\n in a given bitfield must be protected by one lock. If two fields\n in a given bitfield are protected by different locks, the compiler\u0027s\n non-atomic read-modify-write sequences can cause an update to one\n field to corrupt the value of an adjacent field.\n\nbtrfs_space_info has a bitfield sharing an underlying word consisting of\nthe fields full, chunk_alloc, and flush:\n\nstruct btrfs_space_info {\n struct btrfs_fs_info * fs_info; /* 0 8 */\n struct btrfs_space_info * parent; /* 8 8 */\n ...\n int clamp; /* 172 4 */\n unsigned int full:1; /* 176: 0 4 */\n unsigned int chunk_alloc:1; /* 176: 1 4 */\n unsigned int flush:1; /* 176: 2 4 */\n ...\n\nTherefore, to be safe from parallel read-modify-writes losing a write to\none of the bitfield members protected by a lock, all writes to all the\nbitfields must use the lock. They almost universally do, except for\nbtrfs_clear_space_info_full() which iterates over the space_infos and\nwrites out found-\u003efull = 0 without a lock.\n\nImagine that we have one thread completing a transaction in which we\nfinished deleting a block_group and are thus calling\nbtrfs_clear_space_info_full() while simultaneously the data reclaim\nticket infrastructure is running do_async_reclaim_data_space():\n\n T1 T2\nbtrfs_commit_transaction\n btrfs_clear_space_info_full\n data_sinfo-\u003efull = 0\n READ: full:0, chunk_alloc:0, flush:1\n do_async_reclaim_data_space(data_sinfo)\n spin_lock(\u0026space_info-\u003elock);\n if(list_empty(tickets))\n space_info-\u003eflush = 0;\n READ: full: 0, chunk_alloc:0, flush:1\n MOD/WRITE: full: 0, chunk_alloc:0, flush:0\n spin_unlock(\u0026space_info-\u003elock);\n return;\n MOD/WRITE: full:0, chunk_alloc:0, flush:1\n\nand now data_sinfo-\u003eflush is 1 but the reclaim worker has exited. This\nbreaks the invariant that flush is 0 iff there is no work queued or\nrunning. Once this invariant is violated, future allocations that go\ninto __reserve_bytes() will add tickets to space_info-\u003etickets but will\nsee space_info-\u003eflush is set to 1 and not queue the work. After this,\nthey will block forever on the resulting ticket, as it is now impossible\nto kick the worker again.\n\nI also confirmed by looking at the assembly of the affected kernel that\nit is doing RMW operations. For example, to set the flush (3rd) bit to 0,\nthe assembly is:\n andb $0xfb,0x60(%rbx)\nand similarly for setting the full (1st) bit to 0:\n andb $0xfe,-0x20(%rax)\n\nSo I think this is really a bug on practical systems. I have observed\na number of systems in this exact state, but am currently unable to\nreproduce it.\n\nRather than leaving this footgun lying around for the future, take\nadvantage of the fact that there is room in the struct anyway, and that\nit is already quite large and simply change the three bitfield members to\nbools. This avoids writes to space_info-\u003efull having any effect on\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68358",
"url": "https://www.suse.com/security/cve/CVE-2025-68358"
},
{
"category": "external",
"summary": "SUSE Bug 1255531 for CVE-2025-68358",
"url": "https://bugzilla.suse.com/1255531"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-68358"
},
{
"cve": "CVE-2025-68359",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68359"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix double free of qgroup record after failure to add delayed ref head\n\nIn the previous code it was possible to incur into a double kfree()\nscenario when calling add_delayed_ref_head(). This could happen if the\nrecord was reported to already exist in the\nbtrfs_qgroup_trace_extent_nolock() call, but then there was an error\nlater on add_delayed_ref_head(). In this case, since\nadd_delayed_ref_head() returned an error, the caller went to free the\nrecord. Since add_delayed_ref_head() couldn\u0027t set this kfree\u0027d pointer\nto NULL, then kfree() would have acted on a non-NULL \u0027record\u0027 object\nwhich was pointing to memory already freed by the callee.\n\nThe problem comes from the fact that the responsibility to kfree the\nobject is on both the caller and the callee at the same time. Hence, the\nfix for this is to shift the ownership of the \u0027qrecord\u0027 object out of\nthe add_delayed_ref_head(). That is, we will never attempt to kfree()\nthe given object inside of this function, and will expect the caller to\nact on the \u0027qrecord\u0027 object on its own. The only exception where the\n\u0027qrecord\u0027 object cannot be kfree\u0027d is if it was inserted into the\ntracing logic, for which we already have the \u0027qrecord_inserted_ret\u0027\nboolean to account for this. Hence, the caller has to kfree the object\nonly if add_delayed_ref_head() reports not to have inserted it on the\ntracing logic.\n\nAs a side-effect of the above, we must guarantee that\n\u0027qrecord_inserted_ret\u0027 is properly initialized at the start of the\nfunction, not at the end, and then set when an actual insert\nhappens. This way we avoid \u0027qrecord_inserted_ret\u0027 having an invalid\nvalue on an early exit.\n\nThe documentation from the add_delayed_ref_head() has also been updated\nto reflect on the exact ownership of the \u0027qrecord\u0027 object.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68359",
"url": "https://www.suse.com/security/cve/CVE-2025-68359"
},
{
"category": "external",
"summary": "SUSE Bug 1255542 for CVE-2025-68359",
"url": "https://bugzilla.suse.com/1255542"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-68359"
},
{
"cve": "CVE-2025-68360",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68360"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mt76: wed: use proper wed reference in mt76 wed driver callabacks\n\nMT7996 driver can use both wed and wed_hif2 devices to offload traffic\nfrom/to the wireless NIC. In the current codebase we assume to always\nuse the primary wed device in wed callbacks resulting in the following\ncrash if the hw runs wed_hif2 (e.g. 6GHz link).\n\n[ 297.455876] Unable to handle kernel read from unreadable memory at virtual address 000000000000080a\n[ 297.464928] Mem abort info:\n[ 297.467722] ESR = 0x0000000096000005\n[ 297.471461] EC = 0x25: DABT (current EL), IL = 32 bits\n[ 297.476766] SET = 0, FnV = 0\n[ 297.479809] EA = 0, S1PTW = 0\n[ 297.482940] FSC = 0x05: level 1 translation fault\n[ 297.487809] Data abort info:\n[ 297.490679] ISV = 0, ISS = 0x00000005, ISS2 = 0x00000000\n[ 297.496156] CM = 0, WnR = 0, TnD = 0, TagAccess = 0\n[ 297.501196] GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0\n[ 297.506500] user pgtable: 4k pages, 39-bit VAs, pgdp=0000000107480000\n[ 297.512927] [000000000000080a] pgd=08000001097fb003, p4d=08000001097fb003, pud=08000001097fb003, pmd=0000000000000000\n[ 297.523532] Internal error: Oops: 0000000096000005 [#1] SMP\n[ 297.715393] CPU: 2 UID: 0 PID: 45 Comm: kworker/u16:2 Tainted: G O 6.12.50 #0\n[ 297.723908] Tainted: [O]=OOT_MODULE\n[ 297.727384] Hardware name: Banana Pi BPI-R4 (2x SFP+) (DT)\n[ 297.732857] Workqueue: nf_ft_offload_del nf_flow_rule_route_ipv6 [nf_flow_table]\n[ 297.740254] pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n[ 297.747205] pc : mt76_wed_offload_disable+0x64/0xa0 [mt76]\n[ 297.752688] lr : mtk_wed_flow_remove+0x58/0x80\n[ 297.757126] sp : ffffffc080fe3ae0\n[ 297.760430] x29: ffffffc080fe3ae0 x28: ffffffc080fe3be0 x27: 00000000deadbef7\n[ 297.767557] x26: ffffff80c5ebca00 x25: 0000000000000001 x24: ffffff80c85f4c00\n[ 297.774683] x23: ffffff80c1875b78 x22: ffffffc080d42cd0 x21: ffffffc080660018\n[ 297.781809] x20: ffffff80c6a076d0 x19: ffffff80c6a043c8 x18: 0000000000000000\n[ 297.788935] x17: 0000000000000000 x16: 0000000000000001 x15: 0000000000000000\n[ 297.796060] x14: 0000000000000019 x13: ffffff80c0ad8ec0 x12: 00000000fa83b2da\n[ 297.803185] x11: ffffff80c02700c0 x10: ffffff80c0ad8ec0 x9 : ffffff81fef96200\n[ 297.810311] x8 : ffffff80c02700c0 x7 : ffffff80c02700d0 x6 : 0000000000000002\n[ 297.817435] x5 : 0000000000000400 x4 : 0000000000000000 x3 : 0000000000000000\n[ 297.824561] x2 : 0000000000000001 x1 : 0000000000000800 x0 : ffffff80c6a063c8\n[ 297.831686] Call trace:\n[ 297.834123] mt76_wed_offload_disable+0x64/0xa0 [mt76]\n[ 297.839254] mtk_wed_flow_remove+0x58/0x80\n[ 297.843342] mtk_flow_offload_cmd+0x434/0x574\n[ 297.847689] mtk_wed_setup_tc_block_cb+0x30/0x40\n[ 297.852295] nf_flow_offload_ipv6_hook+0x7f4/0x964 [nf_flow_table]\n[ 297.858466] nf_flow_rule_route_ipv6+0x438/0x4a4 [nf_flow_table]\n[ 297.864463] process_one_work+0x174/0x300\n[ 297.868465] worker_thread+0x278/0x430\n[ 297.872204] kthread+0xd8/0xdc\n[ 297.875251] ret_from_fork+0x10/0x20\n[ 297.878820] Code: 928b5ae0 8b000273 91400a60 f943fa61 (79401421)\n[ 297.884901] ---[ end trace 0000000000000000 ]---\n\nFix the issue detecting the proper wed reference to use running wed\ncallabacks.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68360",
"url": "https://www.suse.com/security/cve/CVE-2025-68360"
},
{
"category": "external",
"summary": "SUSE Bug 1255536 for CVE-2025-68360",
"url": "https://bugzilla.suse.com/1255536"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-68360"
},
{
"cve": "CVE-2025-68361",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68361"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nerofs: limit the level of fs stacking for file-backed mounts\n\nOtherwise, it could cause potential kernel stack overflow (e.g., EROFS\nmounting itself).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68361",
"url": "https://www.suse.com/security/cve/CVE-2025-68361"
},
{
"category": "external",
"summary": "SUSE Bug 1255526 for CVE-2025-68361",
"url": "https://bugzilla.suse.com/1255526"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-68361"
},
{
"cve": "CVE-2025-68362",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68362"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: rtl818x: rtl8187: Fix potential buffer underflow in rtl8187_rx_cb()\n\nThe rtl8187_rx_cb() calculates the rx descriptor header address\nby subtracting its size from the skb tail pointer.\nHowever, it does not validate if the received packet\n(skb-\u003elen from urb-\u003eactual_length) is large enough to contain this\nheader.\n\nIf a truncated packet is received, this will lead to a buffer\nunderflow, reading memory before the start of the skb data area,\nand causing a kernel panic.\n\nAdd length checks for both rtl8187 and rtl8187b descriptor headers\nbefore attempting to access them, dropping the packet cleanly if the\ncheck fails.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68362",
"url": "https://www.suse.com/security/cve/CVE-2025-68362"
},
{
"category": "external",
"summary": "SUSE Bug 1255611 for CVE-2025-68362",
"url": "https://bugzilla.suse.com/1255611"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-68362"
},
{
"cve": "CVE-2025-68363",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68363"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Check skb-\u003etransport_header is set in bpf_skb_check_mtu\n\nThe bpf_skb_check_mtu helper needs to use skb-\u003etransport_header when\nthe BPF_MTU_CHK_SEGS flag is used:\n\n\tbpf_skb_check_mtu(skb, ifindex, \u0026mtu_len, 0, BPF_MTU_CHK_SEGS)\n\nThe transport_header is not always set. There is a WARN_ON_ONCE\nreport when CONFIG_DEBUG_NET is enabled + skb-\u003egso_size is set +\nbpf_prog_test_run is used:\n\nWARNING: CPU: 1 PID: 2216 at ./include/linux/skbuff.h:3071\n skb_gso_validate_network_len\n bpf_skb_check_mtu\n bpf_prog_3920e25740a41171_tc_chk_segs_flag # A test in the next patch\n bpf_test_run\n bpf_prog_test_run_skb\n\nFor a normal ingress skb (not test_run), skb_reset_transport_header\nis performed but there is plan to avoid setting it as described in\ncommit 2170a1f09148 (\"net: no longer reset transport_header in __netif_receive_skb_core()\").\n\nThis patch fixes the bpf helper by checking\nskb_transport_header_was_set(). The check is done just before\nskb-\u003etransport_header is used, to avoid breaking the existing bpf prog.\nThe WARN_ON_ONCE is limited to bpf_prog_test_run, so targeting bpf-next.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68363",
"url": "https://www.suse.com/security/cve/CVE-2025-68363"
},
{
"category": "external",
"summary": "SUSE Bug 1255552 for CVE-2025-68363",
"url": "https://bugzilla.suse.com/1255552"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-68363"
},
{
"cve": "CVE-2025-68364",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68364"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocfs2: relax BUG() to ocfs2_error() in __ocfs2_move_extent()\n\nIn \u0027__ocfs2_move_extent()\u0027, relax \u0027BUG()\u0027 to \u0027ocfs2_error()\u0027 just\nto avoid crashing the whole kernel due to a filesystem corruption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68364",
"url": "https://www.suse.com/security/cve/CVE-2025-68364"
},
{
"category": "external",
"summary": "SUSE Bug 1255556 for CVE-2025-68364",
"url": "https://bugzilla.suse.com/1255556"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-68364"
},
{
"cve": "CVE-2025-68365",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68365"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/ntfs3: Initialize allocated memory before use\n\nKMSAN reports: Multiple uninitialized values detected:\n\n- KMSAN: uninit-value in ntfs_read_hdr (3)\n- KMSAN: uninit-value in bcmp (3)\n\nMemory is allocated by __getname(), which is a wrapper for\nkmem_cache_alloc(). This memory is used before being properly\ncleared. Change kmem_cache_alloc() to kmem_cache_zalloc() to\nproperly allocate and clear memory before use.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68365",
"url": "https://www.suse.com/security/cve/CVE-2025-68365"
},
{
"category": "external",
"summary": "SUSE Bug 1255548 for CVE-2025-68365",
"url": "https://bugzilla.suse.com/1255548"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-68365"
},
{
"cve": "CVE-2025-68366",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68366"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnbd: defer config unlock in nbd_genl_connect\n\nThere is one use-after-free warning when running NBD_CMD_CONNECT and\nNBD_CLEAR_SOCK:\n\nnbd_genl_connect\n nbd_alloc_and_init_config // config_refs=1\n nbd_start_device // config_refs=2\n set NBD_RT_HAS_CONFIG_REF\t\t\topen nbd // config_refs=3\n recv_work done // config_refs=2\n\t\t\t\t\t\tNBD_CLEAR_SOCK // config_refs=1\n\t\t\t\t\t\tclose nbd // config_refs=0\n refcount_inc -\u003e uaf\n\n------------[ cut here ]------------\nrefcount_t: addition on 0; use-after-free.\nWARNING: CPU: 24 PID: 1014 at lib/refcount.c:25 refcount_warn_saturate+0x12e/0x290\n nbd_genl_connect+0x16d0/0x1ab0\n genl_family_rcv_msg_doit+0x1f3/0x310\n genl_rcv_msg+0x44a/0x790\n\nThe issue can be easily reproduced by adding a small delay before\nrefcount_inc(\u0026nbd-\u003econfig_refs) in nbd_genl_connect():\n\n mutex_unlock(\u0026nbd-\u003econfig_lock);\n if (!ret) {\n set_bit(NBD_RT_HAS_CONFIG_REF, \u0026config-\u003eruntime_flags);\n+ printk(\"before sleep\\n\");\n+ mdelay(5 * 1000);\n+ printk(\"after sleep\\n\");\n refcount_inc(\u0026nbd-\u003econfig_refs);\n nbd_connect_reply(info, nbd-\u003eindex);\n }",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68366",
"url": "https://www.suse.com/security/cve/CVE-2025-68366"
},
{
"category": "external",
"summary": "SUSE Bug 1255622 for CVE-2025-68366",
"url": "https://bugzilla.suse.com/1255622"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-68366"
},
{
"cve": "CVE-2025-68367",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68367"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmacintosh/mac_hid: fix race condition in mac_hid_toggle_emumouse\n\nThe following warning appears when running syzkaller, and this issue also\nexists in the mainline code.\n\n ------------[ cut here ]------------\n list_add double add: new=ffffffffa57eee28, prev=ffffffffa57eee28, next=ffffffffa5e63100.\n WARNING: CPU: 0 PID: 1491 at lib/list_debug.c:35 __list_add_valid_or_report+0xf7/0x130\n Modules linked in:\n CPU: 0 PID: 1491 Comm: syz.1.28 Not tainted 6.6.0+ #3\n Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014\n RIP: 0010:__list_add_valid_or_report+0xf7/0x130\n RSP: 0018:ff1100010dfb7b78 EFLAGS: 00010282\n RAX: 0000000000000000 RBX: ffffffffa57eee18 RCX: ffffffff97fc9817\n RDX: 0000000000040000 RSI: ffa0000002383000 RDI: 0000000000000001\n RBP: ffffffffa57eee28 R08: 0000000000000001 R09: ffe21c0021bf6f2c\n R10: 0000000000000001 R11: 6464615f7473696c R12: ffffffffa5e63100\n R13: ffffffffa57eee28 R14: ffffffffa57eee28 R15: ff1100010dfb7d48\n FS: 00007fb14398b640(0000) GS:ff11000119600000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 0000000000000000 CR3: 000000010d096005 CR4: 0000000000773ef0\n DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n PKRU: 80000000\n Call Trace:\n \u003cTASK\u003e\n input_register_handler+0xb3/0x210\n mac_hid_start_emulation+0x1c5/0x290\n mac_hid_toggle_emumouse+0x20a/0x240\n proc_sys_call_handler+0x4c2/0x6e0\n new_sync_write+0x1b1/0x2d0\n vfs_write+0x709/0x950\n ksys_write+0x12a/0x250\n do_syscall_64+0x5a/0x110\n entry_SYSCALL_64_after_hwframe+0x78/0xe2\n\nThe WARNING occurs when two processes concurrently write to the mac-hid\nemulation sysctl, causing a race condition in mac_hid_toggle_emumouse().\nBoth processes read old_val=0, then both try to register the input handler,\nleading to a double list_add of the same handler.\n\n CPU0 CPU1\n ------------------------- -------------------------\n vfs_write() //write 1 vfs_write() //write 1\n proc_sys_write() proc_sys_write()\n mac_hid_toggle_emumouse() mac_hid_toggle_emumouse()\n old_val = *valp // old_val=0\n old_val = *valp // old_val=0\n mutex_lock_killable()\n proc_dointvec() // *valp=1\n mac_hid_start_emulation()\n input_register_handler()\n mutex_unlock()\n mutex_lock_killable()\n proc_dointvec()\n mac_hid_start_emulation()\n input_register_handler() //Trigger Warning\n mutex_unlock()\n\nFix this by moving the old_val read inside the mutex lock region.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68367",
"url": "https://www.suse.com/security/cve/CVE-2025-68367"
},
{
"category": "external",
"summary": "SUSE Bug 1255547 for CVE-2025-68367",
"url": "https://bugzilla.suse.com/1255547"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-68367"
},
{
"cve": "CVE-2025-68368",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68368"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmd: init bioset in mddev_init\n\nIO operations may be needed before md_run(), such as updating metadata\nafter writing sysfs. Without bioset, this triggers a NULL pointer\ndereference as below:\n\n BUG: kernel NULL pointer dereference, address: 0000000000000020\n Call Trace:\n md_update_sb+0x658/0xe00\n new_level_store+0xc5/0x120\n md_attr_store+0xc9/0x1e0\n sysfs_kf_write+0x6f/0xa0\n kernfs_fop_write_iter+0x141/0x2a0\n vfs_write+0x1fc/0x5a0\n ksys_write+0x79/0x180\n __x64_sys_write+0x1d/0x30\n x64_sys_call+0x2818/0x2880\n do_syscall_64+0xa9/0x580\n entry_SYSCALL_64_after_hwframe+0x4b/0x53\n\nReproducer\n```\n mdadm -CR /dev/md0 -l1 -n2 /dev/sd[cd]\n echo inactive \u003e /sys/block/md0/md/array_state\n echo 10 \u003e /sys/block/md0/md/new_level\n```\n\nmddev_init() can only be called once per mddev, no need to test if bioset\nhas been initialized anymore.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68368",
"url": "https://www.suse.com/security/cve/CVE-2025-68368"
},
{
"category": "external",
"summary": "SUSE Bug 1255527 for CVE-2025-68368",
"url": "https://bugzilla.suse.com/1255527"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-68368"
},
{
"cve": "CVE-2025-68369",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68369"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nntfs3: init run lock for extend inode\n\nAfter setting the inode mode of $Extend to a regular file, executing the\ntruncate system call will enter the do_truncate() routine, causing the\nrun_lock uninitialized error reported by syzbot.\n\nPrior to patch 4e8011ffec79, if the inode mode of $Extend was not set to\na regular file, the do_truncate() routine would not be entered.\n\nAdd the run_lock initialization when loading $Extend.\n\nsyzbot reported:\nINFO: trying to register non-static key.\nCall Trace:\n dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120\n assign_lock_key+0x133/0x150 kernel/locking/lockdep.c:984\n register_lock_class+0x105/0x320 kernel/locking/lockdep.c:1299\n __lock_acquire+0x99/0xd20 kernel/locking/lockdep.c:5112\n lock_acquire+0x120/0x360 kernel/locking/lockdep.c:5868\n down_write+0x96/0x1f0 kernel/locking/rwsem.c:1590\n ntfs_set_size+0x140/0x200 fs/ntfs3/inode.c:860\n ntfs_extend+0x1d9/0x970 fs/ntfs3/file.c:387\n ntfs_setattr+0x2e8/0xbe0 fs/ntfs3/file.c:808",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68369",
"url": "https://www.suse.com/security/cve/CVE-2025-68369"
},
{
"category": "external",
"summary": "SUSE Bug 1255535 for CVE-2025-68369",
"url": "https://bugzilla.suse.com/1255535"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-68369"
},
{
"cve": "CVE-2025-68370",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68370"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncoresight: tmc: add the handle of the event to the path\n\nThe handle is essential for retrieving the AUX_EVENT of each CPU and is\nrequired in perf mode. It has been added to the coresight_path so that\ndependent devices can access it from the path when needed.\n\nThe existing bug can be reproduced with:\nperf record -e cs_etm//k -C 0-9 dd if=/dev/zero of=/dev/null\n\nShowing an oops as follows:\nUnable to handle kernel paging request at virtual address 000f6e84934ed19e\n\nCall trace:\n tmc_etr_get_buffer+0x30/0x80 [coresight_tmc] (P)\n catu_enable_hw+0xbc/0x3d0 [coresight_catu]\n catu_enable+0x70/0xe0 [coresight_catu]\n coresight_enable_path+0xb0/0x258 [coresight]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68370",
"url": "https://www.suse.com/security/cve/CVE-2025-68370"
},
{
"category": "external",
"summary": "SUSE Bug 1255534 for CVE-2025-68370",
"url": "https://bugzilla.suse.com/1255534"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-68370"
},
{
"cve": "CVE-2025-68371",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68371"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: smartpqi: Fix device resources accessed after device removal\n\nCorrect possible race conditions during device removal.\n\nPreviously, a scheduled work item to reset a LUN could still execute\nafter the device was removed, leading to use-after-free and other\nresource access issues.\n\nThis race condition occurs because the abort handler may schedule a LUN\nreset concurrently with device removal via sdev_destroy(), leading to\nuse-after-free and improper access to freed resources.\n\n - Check in the device reset handler if the device is still present in\n the controller\u0027s SCSI device list before running; if not, the reset\n is skipped.\n\n - Cancel any pending TMF work that has not started in sdev_destroy().\n\n - Ensure device freeing in sdev_destroy() is done while holding the\n LUN reset mutex to avoid races with ongoing resets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68371",
"url": "https://www.suse.com/security/cve/CVE-2025-68371"
},
{
"category": "external",
"summary": "SUSE Bug 1255572 for CVE-2025-68371",
"url": "https://bugzilla.suse.com/1255572"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-68371"
},
{
"cve": "CVE-2025-68372",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68372"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnbd: defer config put in recv_work\n\nThere is one uaf issue in recv_work when running NBD_CLEAR_SOCK and\nNBD_CMD_RECONFIGURE:\n nbd_genl_connect // conf_ref=2 (connect and recv_work A)\n nbd_open\t // conf_ref=3\n recv_work A done // conf_ref=2\n NBD_CLEAR_SOCK // conf_ref=1\n nbd_genl_reconfigure // conf_ref=2 (trigger recv_work B)\n close nbd\t // conf_ref=1\n recv_work B\n config_put // conf_ref=0\n atomic_dec(\u0026config-\u003erecv_threads); -\u003e UAF\n\nOr only running NBD_CLEAR_SOCK:\n nbd_genl_connect // conf_ref=2\n nbd_open \t // conf_ref=3\n NBD_CLEAR_SOCK // conf_ref=2\n close nbd\n nbd_release\n config_put // conf_ref=1\n recv_work\n config_put \t // conf_ref=0\n atomic_dec(\u0026config-\u003erecv_threads); -\u003e UAF\n\nCommit 87aac3a80af5 (\"nbd: call nbd_config_put() before notifying the\nwaiter\") moved nbd_config_put() to run before waking up the waiter in\nrecv_work, in order to ensure that nbd_start_device_ioctl() would not\nbe woken up while nbd-\u003etask_recv was still uncleared.\n\nHowever, in nbd_start_device_ioctl(), after being woken up it explicitly\ncalls flush_workqueue() to make sure all current works are finished.\nTherefore, there is no need to move the config put ahead of the wakeup.\n\nMove nbd_config_put() to the end of recv_work, so that the reference is\nheld for the whole lifetime of the worker thread. This makes sure the\nconfig cannot be freed while recv_work is still running, even if clear\n+ reconfigure interleave.\n\nIn addition, we don\u0027t need to worry about recv_work dropping the last\nnbd_put (which causes deadlock):\n\npath A (netlink with NBD_CFLAG_DESTROY_ON_DISCONNECT):\n connect // nbd_refs=1 (trigger recv_work)\n open nbd // nbd_refs=2\n NBD_CLEAR_SOCK\n close nbd\n nbd_release\n nbd_disconnect_and_put\n flush_workqueue // recv_work done\n nbd_config_put\n nbd_put // nbd_refs=1\n nbd_put // nbd_refs=0\n queue_work\n\npath B (netlink without NBD_CFLAG_DESTROY_ON_DISCONNECT):\n connect // nbd_refs=2 (trigger recv_work)\n open nbd // nbd_refs=3\n NBD_CLEAR_SOCK // conf_refs=2\n close nbd\n nbd_release\n nbd_config_put // conf_refs=1\n nbd_put // nbd_refs=2\n recv_work done // conf_refs=0, nbd_refs=1\n rmmod // nbd_refs=0\n\nDepends-on: e2daec488c57 (\"nbd: Fix hungtask when nbd_config_put\")",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68372",
"url": "https://www.suse.com/security/cve/CVE-2025-68372"
},
{
"category": "external",
"summary": "SUSE Bug 1255537 for CVE-2025-68372",
"url": "https://bugzilla.suse.com/1255537"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-68372"
},
{
"cve": "CVE-2025-68373",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68373"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmd: avoid repeated calls to del_gendisk\n\nThere is a uaf problem which is found by case 23rdev-lifetime:\n\nOops: general protection fault, probably for non-canonical address 0xdead000000000122\nRIP: 0010:bdi_unregister+0x4b/0x170\nCall Trace:\n \u003cTASK\u003e\n __del_gendisk+0x356/0x3e0\n mddev_unlock+0x351/0x360\n rdev_attr_store+0x217/0x280\n kernfs_fop_write_iter+0x14a/0x210\n vfs_write+0x29e/0x550\n ksys_write+0x74/0xf0\n do_syscall_64+0xbb/0x380\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7ff5250a177e\n\nThe sequence is:\n1. rdev remove path gets reconfig_mutex\n2. rdev remove path release reconfig_mutex in mddev_unlock\n3. md stop calls do_md_stop and sets MD_DELETED\n4. rdev remove path calls del_gendisk because MD_DELETED is set\n5. md stop path release reconfig_mutex and calls del_gendisk again\n\nSo there is a race condition we should resolve. This patch adds a\nflag MD_DO_DELETE to avoid the race condition.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68373",
"url": "https://www.suse.com/security/cve/CVE-2025-68373"
},
{
"category": "external",
"summary": "SUSE Bug 1255610 for CVE-2025-68373",
"url": "https://bugzilla.suse.com/1255610"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-68373"
},
{
"cve": "CVE-2025-68374",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68374"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmd: fix rcu protection in md_wakeup_thread\n\nWe attempted to use RCU to protect the pointer \u0027thread\u0027, but directly\npassed the value when calling md_wakeup_thread(). This means that the\nRCU pointer has been acquired before rcu_read_lock(), which renders\nrcu_read_lock() ineffective and could lead to a use-after-free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68374",
"url": "https://www.suse.com/security/cve/CVE-2025-68374"
},
{
"category": "external",
"summary": "SUSE Bug 1255530 for CVE-2025-68374",
"url": "https://bugzilla.suse.com/1255530"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-68374"
},
{
"cve": "CVE-2025-68375",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68375"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nperf/x86: Fix NULL event access and potential PEBS record loss\n\nWhen intel_pmu_drain_pebs_icl() is called to drain PEBS records, the\nperf_event_overflow() could be called to process the last PEBS record.\n\nWhile perf_event_overflow() could trigger the interrupt throttle and\nstop all events of the group, like what the below call-chain shows.\n\nperf_event_overflow()\n -\u003e __perf_event_overflow()\n -\u003e__perf_event_account_interrupt()\n -\u003e perf_event_throttle_group()\n -\u003e perf_event_throttle()\n -\u003e event-\u003epmu-\u003estop()\n -\u003e x86_pmu_stop()\n\nThe side effect of stopping the events is that all corresponding event\npointers in cpuc-\u003eevents[] array are cleared to NULL.\n\nAssume there are two PEBS events (event a and event b) in a group. When\nintel_pmu_drain_pebs_icl() calls perf_event_overflow() to process the\nlast PEBS record of PEBS event a, interrupt throttle is triggered and\nall pointers of event a and event b are cleared to NULL. Then\nintel_pmu_drain_pebs_icl() tries to process the last PEBS record of\nevent b and encounters NULL pointer access.\n\nTo avoid this issue, move cpuc-\u003eevents[] clearing from x86_pmu_stop()\nto x86_pmu_del(). It\u0027s safe since cpuc-\u003eactive_mask or\ncpuc-\u003epebs_enabled is always checked before access the event pointer\nfrom cpuc-\u003eevents[].",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68375",
"url": "https://www.suse.com/security/cve/CVE-2025-68375"
},
{
"category": "external",
"summary": "SUSE Bug 1255575 for CVE-2025-68375",
"url": "https://bugzilla.suse.com/1255575"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-68375"
},
{
"cve": "CVE-2025-68376",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68376"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncoresight: ETR: Fix ETR buffer use-after-free issue\n\nWhen ETR is enabled as CS_MODE_SYSFS, if the buffer size is changed\nand enabled again, currently sysfs_buf will point to the newly\nallocated memory(buf_new) and free the old memory(buf_old). But the\netr_buf that is being used by the ETR remains pointed to buf_old, not\nupdated to buf_new. In this case, it will result in a memory\nuse-after-free issue.\n\nFix this by checking ETR\u0027s mode before updating and releasing buf_old,\nif the mode is CS_MODE_SYSFS, then skip updating and releasing it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68376",
"url": "https://www.suse.com/security/cve/CVE-2025-68376"
},
{
"category": "external",
"summary": "SUSE Bug 1255529 for CVE-2025-68376",
"url": "https://bugzilla.suse.com/1255529"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-68376"
},
{
"cve": "CVE-2025-68377",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68377"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nns: initialize ns_list_node for initial namespaces\n\nMake sure that the list is always initialized for initial namespaces.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68377",
"url": "https://www.suse.com/security/cve/CVE-2025-68377"
},
{
"category": "external",
"summary": "SUSE Bug 1255592 for CVE-2025-68377",
"url": "https://bugzilla.suse.com/1255592"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-68377"
},
{
"cve": "CVE-2025-68378",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68378"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix stackmap overflow check in __bpf_get_stackid()\n\nSyzkaller reported a KASAN slab-out-of-bounds write in __bpf_get_stackid()\nwhen copying stack trace data. The issue occurs when the perf trace\n contains more stack entries than the stack map bucket can hold,\n leading to an out-of-bounds write in the bucket\u0027s data array.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68378",
"url": "https://www.suse.com/security/cve/CVE-2025-68378"
},
{
"category": "external",
"summary": "SUSE Bug 1255614 for CVE-2025-68378",
"url": "https://bugzilla.suse.com/1255614"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-68378"
},
{
"cve": "CVE-2025-68379",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68379"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/rxe: Fix null deref on srq-\u003erq.queue after resize failure\n\nA NULL pointer dereference can occur in rxe_srq_chk_attr() when\nibv_modify_srq() is invoked twice in succession under certain error\nconditions. The first call may fail in rxe_queue_resize(), which leads\nrxe_srq_from_attr() to set srq-\u003erq.queue = NULL. The second call then\ntriggers a crash (null deref) when accessing\nsrq-\u003erq.queue-\u003ebuf-\u003eindex_mask.\n\nCall Trace:\n\u003cTASK\u003e\nrxe_modify_srq+0x170/0x480 [rdma_rxe]\n? __pfx_rxe_modify_srq+0x10/0x10 [rdma_rxe]\n? uverbs_try_lock_object+0x4f/0xa0 [ib_uverbs]\n? rdma_lookup_get_uobject+0x1f0/0x380 [ib_uverbs]\nib_uverbs_modify_srq+0x204/0x290 [ib_uverbs]\n? __pfx_ib_uverbs_modify_srq+0x10/0x10 [ib_uverbs]\n? tryinc_node_nr_active+0xe6/0x150\n? uverbs_fill_udata+0xed/0x4f0 [ib_uverbs]\nib_uverbs_handler_UVERBS_METHOD_INVOKE_WRITE+0x2c0/0x470 [ib_uverbs]\n? __pfx_ib_uverbs_handler_UVERBS_METHOD_INVOKE_WRITE+0x10/0x10 [ib_uverbs]\n? uverbs_fill_udata+0xed/0x4f0 [ib_uverbs]\nib_uverbs_run_method+0x55a/0x6e0 [ib_uverbs]\n? __pfx_ib_uverbs_handler_UVERBS_METHOD_INVOKE_WRITE+0x10/0x10 [ib_uverbs]\nib_uverbs_cmd_verbs+0x54d/0x800 [ib_uverbs]\n? __pfx_ib_uverbs_cmd_verbs+0x10/0x10 [ib_uverbs]\n? __pfx___raw_spin_lock_irqsave+0x10/0x10\n? __pfx_do_vfs_ioctl+0x10/0x10\n? ioctl_has_perm.constprop.0.isra.0+0x2c7/0x4c0\n? __pfx_ioctl_has_perm.constprop.0.isra.0+0x10/0x10\nib_uverbs_ioctl+0x13e/0x220 [ib_uverbs]\n? __pfx_ib_uverbs_ioctl+0x10/0x10 [ib_uverbs]\n__x64_sys_ioctl+0x138/0x1c0\ndo_syscall_64+0x82/0x250\n? fdget_pos+0x58/0x4c0\n? ksys_write+0xf3/0x1c0\n? __pfx_ksys_write+0x10/0x10\n? do_syscall_64+0xc8/0x250\n? __pfx_vm_mmap_pgoff+0x10/0x10\n? fget+0x173/0x230\n? fput+0x2a/0x80\n? ksys_mmap_pgoff+0x224/0x4c0\n? do_syscall_64+0xc8/0x250\n? do_user_addr_fault+0x37b/0xfe0\n? clear_bhb_loop+0x50/0xa0\n? clear_bhb_loop+0x50/0xa0\n? clear_bhb_loop+0x50/0xa0\nentry_SYSCALL_64_after_hwframe+0x76/0x7e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68379",
"url": "https://www.suse.com/security/cve/CVE-2025-68379"
},
{
"category": "external",
"summary": "SUSE Bug 1255695 for CVE-2025-68379",
"url": "https://bugzilla.suse.com/1255695"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-68379"
},
{
"cve": "CVE-2025-68380",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68380"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath11k: fix peer HE MCS assignment\n\nIn ath11k_wmi_send_peer_assoc_cmd(), peer\u0027s transmit MCS is sent to\nfirmware as receive MCS while peer\u0027s receive MCS sent as transmit MCS,\nwhich goes against firmwire\u0027s definition.\n\nWhile connecting to a misbehaved AP that advertises 0xffff (meaning not\nsupported) for 160 MHz transmit MCS map, firmware crashes due to 0xffff\nis assigned to he_mcs-\u003erx_mcs_set field.\n\n\tExt Tag: HE Capabilities\n\t [...]\n\t Supported HE-MCS and NSS Set\n\t\t[...]\n\t Rx and Tx MCS Maps 160 MHz\n\t\t [...]\n\t Tx HE-MCS Map 160 MHz: 0xffff\n\nSwap the assignment to fix this issue.\n\nAs the HE rate control mask is meant to limit our own transmit MCS, it\nneeds to go via he_mcs-\u003erx_mcs_set field. With the aforementioned swapping\ndone, change is needed as well to apply it to the peer\u0027s receive MCS.\n\nTested-on: WCN6855 hw2.1 PCI WLAN.HSP.1.1-03125-QCAHSPSWPL_V1_V2_SILICONZ_LITE-3.6510.41\nTested-on: QCN9274 hw2.0 PCI WLAN.WBE.1.4.1-00199-QCAHKSWPL_SILICONZ-1",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68380",
"url": "https://www.suse.com/security/cve/CVE-2025-68380"
},
{
"category": "external",
"summary": "SUSE Bug 1255580 for CVE-2025-68380",
"url": "https://bugzilla.suse.com/1255580"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-68380"
},
{
"cve": "CVE-2025-68724",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68724"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: asymmetric_keys - prevent overflow in asymmetric_key_generate_id\n\nUse check_add_overflow() to guard against potential integer overflows\nwhen adding the binary blob lengths and the size of an asymmetric_key_id\nstructure and return ERR_PTR(-EOVERFLOW) accordingly. This prevents a\npossible buffer overflow when copying data from potentially malicious\nX.509 certificate fields that can be arbitrarily large, such as ASN.1\nINTEGER serial numbers, issuer names, etc.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68724",
"url": "https://www.suse.com/security/cve/CVE-2025-68724"
},
{
"category": "external",
"summary": "SUSE Bug 1255550 for CVE-2025-68724",
"url": "https://bugzilla.suse.com/1255550"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-68724"
},
{
"cve": "CVE-2025-68725",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68725"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Do not let BPF test infra emit invalid GSO types to stack\n\nYinhao et al. reported that their fuzzer tool was able to trigger a\nskb_warn_bad_offload() from netif_skb_features() -\u003e gso_features_check().\nWhen a BPF program - triggered via BPF test infra - pushes the packet\nto the loopback device via bpf_clone_redirect() then mentioned offload\nwarning can be seen. GSO-related features are then rightfully disabled.\n\nWe get into this situation due to convert___skb_to_skb() setting\ngso_segs and gso_size but not gso_type. Technically, it makes sense\nthat this warning triggers since the GSO properties are malformed due\nto the gso_type. Potentially, the gso_type could be marked non-trustworthy\nthrough setting it at least to SKB_GSO_DODGY without any other specific\nassumptions, but that also feels wrong given we should not go further\ninto the GSO engine in the first place.\n\nThe checks were added in 121d57af308d (\"gso: validate gso_type in GSO\nhandlers\") because there were malicious (syzbot) senders that combine\na protocol with a non-matching gso_type. If we would want to drop such\npackets, gso_features_check() currently only returns feature flags via\nnetif_skb_features(), so one location for potentially dropping such skbs\ncould be validate_xmit_unreadable_skb(), but then otoh it would be\nan additional check in the fast-path for a very corner case. Given\nbpf_clone_redirect() is the only place where BPF test infra could emit\nsuch packets, lets reject them right there.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68725",
"url": "https://www.suse.com/security/cve/CVE-2025-68725"
},
{
"category": "external",
"summary": "SUSE Bug 1255569 for CVE-2025-68725",
"url": "https://bugzilla.suse.com/1255569"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-68725"
},
{
"cve": "CVE-2025-68726",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68726"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: aead - Fix reqsize handling\n\nCommit afddce13ce81d (\"crypto: api - Add reqsize to crypto_alg\")\nintroduced cra_reqsize field in crypto_alg struct to replace type\nspecific reqsize fields. It looks like this was introduced specifically\nfor ahash and acomp from the commit description as subsequent commits\nadd necessary changes in these alg frameworks.\n\nHowever, this is being recommended for use in all crypto algs\ninstead of setting reqsize using crypto_*_set_reqsize(). Using\ncra_reqsize in aead algorithms, hence, causes memory corruptions and\ncrashes as the underlying functions in the algorithm framework have not\nbeen updated to set the reqsize properly from cra_reqsize. [1]\n\nAdd proper set_reqsize calls in the aead init function to properly\ninitialize reqsize for these algorithms in the framework.\n\n[1]: https://gist.github.com/Pratham-T/24247446f1faf4b7843e4014d5089f6b",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68726",
"url": "https://www.suse.com/security/cve/CVE-2025-68726"
},
{
"category": "external",
"summary": "SUSE Bug 1255598 for CVE-2025-68726",
"url": "https://bugzilla.suse.com/1255598"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-68726"
},
{
"cve": "CVE-2025-68727",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68727"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nntfs3: Fix uninit buffer allocated by __getname()\n\nFix uninit errors caused after buffer allocation given to \u0027de\u0027; by\ninitializing the buffer with zeroes. The fix was found by using KMSAN.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68727",
"url": "https://www.suse.com/security/cve/CVE-2025-68727"
},
{
"category": "external",
"summary": "SUSE Bug 1255568 for CVE-2025-68727",
"url": "https://bugzilla.suse.com/1255568"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-68727"
},
{
"cve": "CVE-2025-68728",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68728"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nntfs3: fix uninit memory after failed mi_read in mi_format_new\n\nFix a KMSAN un-init bug found by syzkaller.\n\nntfs_get_bh() expects a buffer from sb_getblk(), that buffer may not be\nuptodate. We do not bring the buffer uptodate before setting it as\nuptodate. If the buffer were to not be uptodate, it could mean adding a\nbuffer with un-init data to the mi record. Attempting to load that record\nwill trigger KMSAN.\n\nAvoid this by setting the buffer as uptodate, if it\u0027s not already, by\noverwriting it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68728",
"url": "https://www.suse.com/security/cve/CVE-2025-68728"
},
{
"category": "external",
"summary": "SUSE Bug 1255539 for CVE-2025-68728",
"url": "https://bugzilla.suse.com/1255539"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-68728"
},
{
"cve": "CVE-2025-68729",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68729"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath12k: Fix MSDU buffer types handling in RX error path\n\nCurrently, packets received on the REO exception ring from\nunassociated peers are of MSDU buffer type, while the driver expects\nlink descriptor type packets. These packets are not parsed further due\nto a return check on packet type in ath12k_hal_desc_reo_parse_err(),\nbut the associated skb is not freed. This may lead to kernel\ncrashes and buffer leaks.\n\nHence to fix, update the RX error handler to explicitly drop\nMSDU buffer type packets received on the REO exception ring.\nThis prevents further processing of invalid packets and ensures\nstability in the RX error handling path.\n\nTested-on: QCN9274 hw2.0 PCI WLAN.WBE.1.4.1-00199-QCAHKSWPL_SILICONZ-1",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68729",
"url": "https://www.suse.com/security/cve/CVE-2025-68729"
},
{
"category": "external",
"summary": "SUSE Bug 1255692 for CVE-2025-68729",
"url": "https://bugzilla.suse.com/1255692"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-68729"
},
{
"cve": "CVE-2025-68730",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68730"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\naccel/ivpu: Fix page fault in ivpu_bo_unbind_all_bos_from_context()\n\nDon\u0027t add BO to the vdev-\u003ebo_list in ivpu_gem_create_object().\nWhen failure happens inside drm_gem_shmem_create(), the BO is not\nfully created and ivpu_gem_bo_free() callback will not be called\ncausing a deleted BO to be left on the list.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68730",
"url": "https://www.suse.com/security/cve/CVE-2025-68730"
},
{
"category": "external",
"summary": "SUSE Bug 1255602 for CVE-2025-68730",
"url": "https://bugzilla.suse.com/1255602"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-68730"
},
{
"cve": "CVE-2025-68731",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68731"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\naccel/amdxdna: Fix an integer overflow in aie2_query_ctx_status_array()\n\nThe unpublished smatch static checker reported a warning.\n\ndrivers/accel/amdxdna/aie2_pci.c:904 aie2_query_ctx_status_array()\nwarn: potential user controlled sizeof overflow\n\u0027args-\u003enum_element * args-\u003eelement_size\u0027 \u00271-u32max(user) * 1-u32max(user)\u0027\n\nEven this will not cause a real issue, it is better to put a reasonable\nlimitation for element_size and num_element. Add condition to make sure\nthe input element_size \u003c= 4K and num_element \u003c= 1K.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68731",
"url": "https://www.suse.com/security/cve/CVE-2025-68731"
},
{
"category": "external",
"summary": "SUSE Bug 1255696 for CVE-2025-68731",
"url": "https://bugzilla.suse.com/1255696"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2025-68731"
},
{
"cve": "CVE-2025-68732",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68732"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ngpu: host1x: Fix race in syncpt alloc/free\n\nFix race condition between host1x_syncpt_alloc()\nand host1x_syncpt_put() by using kref_put_mutex()\ninstead of kref_put() + manual mutex locking.\n\nThis ensures no thread can acquire the\nsyncpt_mutex after the refcount drops to zero\nbut before syncpt_release acquires it.\nThis prevents races where syncpoints could\nbe allocated while still being cleaned up\nfrom a previous release.\n\nRemove explicit mutex locking in syncpt_release\nas kref_put_mutex() handles this atomically.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68732",
"url": "https://www.suse.com/security/cve/CVE-2025-68732"
},
{
"category": "external",
"summary": "SUSE Bug 1255688 for CVE-2025-68732",
"url": "https://bugzilla.suse.com/1255688"
},
{
"category": "external",
"summary": "SUSE Bug 1255689 for CVE-2025-68732",
"url": "https://bugzilla.suse.com/1255689"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-68732"
},
{
"cve": "CVE-2025-68733",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68733"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmack: fix bug: unprivileged task can create labels\n\nIf an unprivileged task is allowed to relabel itself\n(/smack/relabel-self is not empty),\nit can freely create new labels by writing their\nnames into own /proc/PID/attr/smack/current\n\nThis occurs because do_setattr() imports\nthe provided label in advance,\nbefore checking \"relabel-self\" list.\n\nThis change ensures that the \"relabel-self\" list\nis checked before importing the label.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68733",
"url": "https://www.suse.com/security/cve/CVE-2025-68733"
},
{
"category": "external",
"summary": "SUSE Bug 1255615 for CVE-2025-68733",
"url": "https://bugzilla.suse.com/1255615"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-68733"
},
{
"cve": "CVE-2025-68735",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68735"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/panthor: Prevent potential UAF in group creation\n\nThis commit prevents the possibility of a use after free issue in the\nGROUP_CREATE ioctl function, which arose as pointer to the group is\naccessed in that ioctl function after storing it in the Xarray.\nA malicious userspace can second guess the handle of a group and try\nto call GROUP_DESTROY ioctl from another thread around the same time\nas GROUP_CREATE ioctl.\n\nTo prevent the use after free exploit, this commit uses a mark on an\nentry of group pool Xarray which is added just before returning from\nthe GROUP_CREATE ioctl function. The mark is checked for all ioctls\nthat specify the group handle and so userspace won\u0027t be abe to delete\na group that isn\u0027t marked yet.\n\nv2: Add R-bs and fixes tags",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68735",
"url": "https://www.suse.com/security/cve/CVE-2025-68735"
},
{
"category": "external",
"summary": "SUSE Bug 1255811 for CVE-2025-68735",
"url": "https://bugzilla.suse.com/1255811"
},
{
"category": "external",
"summary": "SUSE Bug 1256251 for CVE-2025-68735",
"url": "https://bugzilla.suse.com/1256251"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-68735"
},
{
"cve": "CVE-2025-68736",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68736"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nlandlock: Fix handling of disconnected directories\n\nDisconnected files or directories can appear when they are visible and\nopened from a bind mount, but have been renamed or moved from the source\nof the bind mount in a way that makes them inaccessible from the mount\npoint (i.e. out of scope).\n\nPreviously, access rights tied to files or directories opened through a\ndisconnected directory were collected by walking the related hierarchy\ndown to the root of the filesystem, without taking into account the\nmount point because it couldn\u0027t be found. This could lead to\ninconsistent access results, potential access right widening, and\nhard-to-debug renames, especially since such paths cannot be printed.\n\nFor a sandboxed task to create a disconnected directory, it needs to\nhave write access (i.e. FS_MAKE_REG, FS_REMOVE_FILE, and FS_REFER) to\nthe underlying source of the bind mount, and read access to the related\nmount point. Because a sandboxed task cannot acquire more access\nrights than those defined by its Landlock domain, this could lead to\ninconsistent access rights due to missing permissions that should be\ninherited from the mount point hierarchy, while inheriting permissions\nfrom the filesystem hierarchy hidden by this mount point instead.\n\nLandlock now handles files and directories opened from disconnected\ndirectories by taking into account the filesystem hierarchy when the\nmount point is not found in the hierarchy walk, and also always taking\ninto account the mount point from which these disconnected directories\nwere opened. This ensures that a rename is not allowed if it would\nwiden access rights [1].\n\nThe rationale is that, even if disconnected hierarchies might not be\nvisible or accessible to a sandboxed task, relying on the collected\naccess rights from them improves the guarantee that access rights will\nnot be widened during a rename because of the access right comparison\nbetween the source and the destination (see LANDLOCK_ACCESS_FS_REFER).\nIt may look like this would grant more access on disconnected files and\ndirectories, but the security policies are always enforced for all the\nevaluated hierarchies. This new behavior should be less surprising to\nusers and safer from an access control perspective.\n\nRemove a wrong WARN_ON_ONCE() canary in collect_domain_accesses() and\nfix the related comment.\n\nBecause opened files have their access rights stored in the related file\nsecurity properties, there is no impact for disconnected or unlinked\nfiles.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68736",
"url": "https://www.suse.com/security/cve/CVE-2025-68736"
},
{
"category": "external",
"summary": "SUSE Bug 1255698 for CVE-2025-68736",
"url": "https://bugzilla.suse.com/1255698"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-68736"
},
{
"cve": "CVE-2025-68737",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68737"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\narm64/pageattr: Propagate return value from __change_memory_common\n\nThe rodata=on security measure requires that any code path which does\nvmalloc -\u003e set_memory_ro/set_memory_rox must protect the linear map alias\ntoo. Therefore, if such a call fails, we must abort set_memory_* and caller\nmust take appropriate action; currently we are suppressing the error, and\nthere is a real chance of such an error arising post commit a166563e7ec3\n(\"arm64: mm: support large block mapping when rodata=full\"). Therefore,\npropagate any error to the caller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68737",
"url": "https://www.suse.com/security/cve/CVE-2025-68737"
},
{
"category": "external",
"summary": "SUSE Bug 1255699 for CVE-2025-68737",
"url": "https://bugzilla.suse.com/1255699"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-68737"
},
{
"cve": "CVE-2025-68738",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68738"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mt76: mt7996: fix null pointer deref in mt7996_conf_tx()\n\nIf a link does not have an assigned channel yet, mt7996_vif_link returns\nNULL. We still need to store the updated queue settings in that case, and\napply them later.\nMove the location of the queue params to within struct mt7996_vif_link.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68738",
"url": "https://www.suse.com/security/cve/CVE-2025-68738"
},
{
"category": "external",
"summary": "SUSE Bug 1255700 for CVE-2025-68738",
"url": "https://bugzilla.suse.com/1255700"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-68738"
},
{
"cve": "CVE-2025-68739",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68739"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nPM / devfreq: hisi: Fix potential UAF in OPP handling\n\nEnsure all required data is acquired before calling dev_pm_opp_put(opp)\nto maintain correct resource acquisition and release order.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68739",
"url": "https://www.suse.com/security/cve/CVE-2025-68739"
},
{
"category": "external",
"summary": "SUSE Bug 1255701 for CVE-2025-68739",
"url": "https://bugzilla.suse.com/1255701"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-68739"
},
{
"cve": "CVE-2025-68740",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68740"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nima: Handle error code returned by ima_filter_rule_match()\n\nIn ima_match_rules(), if ima_filter_rule_match() returns -ENOENT due to\nthe rule being NULL, the function incorrectly skips the \u0027if (!rc)\u0027 check\nand sets \u0027result = true\u0027. The LSM rule is considered a match, causing\nextra files to be measured by IMA.\n\nThis issue can be reproduced in the following scenario:\nAfter unloading the SELinux policy module via \u0027semodule -d\u0027, if an IMA\nmeasurement is triggered before ima_lsm_rules is updated,\nin ima_match_rules(), the first call to ima_filter_rule_match() returns\n-ESTALE. This causes the code to enter the \u0027if (rc == -ESTALE \u0026\u0026\n!rule_reinitialized)\u0027 block, perform ima_lsm_copy_rule() and retry. In\nima_lsm_copy_rule(), since the SELinux module has been removed, the rule\nbecomes NULL, and the second call to ima_filter_rule_match() returns\n-ENOENT. This bypasses the \u0027if (!rc)\u0027 check and results in a false match.\n\nCall trace:\n selinux_audit_rule_match+0x310/0x3b8\n security_audit_rule_match+0x60/0xa0\n ima_match_rules+0x2e4/0x4a0\n ima_match_policy+0x9c/0x1e8\n ima_get_action+0x48/0x60\n process_measurement+0xf8/0xa98\n ima_bprm_check+0x98/0xd8\n security_bprm_check+0x5c/0x78\n search_binary_handler+0x6c/0x318\n exec_binprm+0x58/0x1b8\n bprm_execve+0xb8/0x130\n do_execveat_common.isra.0+0x1a8/0x258\n __arm64_sys_execve+0x48/0x68\n invoke_syscall+0x50/0x128\n el0_svc_common.constprop.0+0xc8/0xf0\n do_el0_svc+0x24/0x38\n el0_svc+0x44/0x200\n el0t_64_sync_handler+0x100/0x130\n el0t_64_sync+0x3c8/0x3d0\n\nFix this by changing \u0027if (!rc)\u0027 to \u0027if (rc \u003c= 0)\u0027 to ensure that error\ncodes like -ENOENT do not bypass the check and accidentally result in a\nsuccessful match.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68740",
"url": "https://www.suse.com/security/cve/CVE-2025-68740"
},
{
"category": "external",
"summary": "SUSE Bug 1255812 for CVE-2025-68740",
"url": "https://bugzilla.suse.com/1255812"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-68740"
},
{
"cve": "CVE-2025-68741",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68741"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla2xxx: Fix improper freeing of purex item\n\nIn qla2xxx_process_purls_iocb(), an item is allocated via\nqla27xx_copy_multiple_pkt(), which internally calls\nqla24xx_alloc_purex_item().\n\nThe qla24xx_alloc_purex_item() function may return a pre-allocated item\nfrom a per-adapter pool for small allocations, instead of dynamically\nallocating memory with kzalloc().\n\nAn error handling path in qla2xxx_process_purls_iocb() incorrectly uses\nkfree() to release the item. If the item was from the pre-allocated\npool, calling kfree() on it is a bug that can lead to memory corruption.\n\nFix this by using the correct deallocation function,\nqla24xx_free_purex_item(), which properly handles both dynamically\nallocated and pre-allocated items.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68741",
"url": "https://www.suse.com/security/cve/CVE-2025-68741"
},
{
"category": "external",
"summary": "SUSE Bug 1255703 for CVE-2025-68741",
"url": "https://bugzilla.suse.com/1255703"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-68741"
},
{
"cve": "CVE-2025-68742",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68742"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix invalid prog-\u003estats access when update_effective_progs fails\n\nSyzkaller triggers an invalid memory access issue following fault\ninjection in update_effective_progs. The issue can be described as\nfollows:\n\n__cgroup_bpf_detach\n update_effective_progs\n compute_effective_progs\n bpf_prog_array_alloc \u003c-- fault inject\n purge_effective_progs\n /* change to dummy_bpf_prog */\n array-\u003eitems[index] = \u0026dummy_bpf_prog.prog\n\n---softirq start---\n__do_softirq\n ...\n __cgroup_bpf_run_filter_skb\n __bpf_prog_run_save_cb\n bpf_prog_run\n stats = this_cpu_ptr(prog-\u003estats)\n /* invalid memory access */\n flags = u64_stats_update_begin_irqsave(\u0026stats-\u003esyncp)\n---softirq end---\n\n static_branch_dec(\u0026cgroup_bpf_enabled_key[atype])\n\nThe reason is that fault injection caused update_effective_progs to fail\nand then changed the original prog into dummy_bpf_prog.prog in\npurge_effective_progs. Then a softirq came, and accessing the members of\ndummy_bpf_prog.prog in the softirq triggers invalid mem access.\n\nTo fix it, skip updating stats when stats is NULL.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68742",
"url": "https://www.suse.com/security/cve/CVE-2025-68742"
},
{
"category": "external",
"summary": "SUSE Bug 1255707 for CVE-2025-68742",
"url": "https://bugzilla.suse.com/1255707"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-68742"
},
{
"cve": "CVE-2025-68743",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68743"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmshv: Fix create memory region overlap check\n\nThe current check is incorrect; it only checks if the beginning or end\nof a region is within an existing region. This doesn\u0027t account for\nuserspace specifying a region that begins before and ends after an\nexisting region.\n\nChange the logic to a range intersection check against gfns and uaddrs\nfor each region.\n\nRemove mshv_partition_region_by_uaddr() as it is no longer used.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68743",
"url": "https://www.suse.com/security/cve/CVE-2025-68743"
},
{
"category": "external",
"summary": "SUSE Bug 1255708 for CVE-2025-68743",
"url": "https://bugzilla.suse.com/1255708"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-68743"
},
{
"cve": "CVE-2025-68744",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68744"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Free special fields when update [lru_,]percpu_hash maps\n\nAs [lru_,]percpu_hash maps support BPF_KPTR_{REF,PERCPU}, missing\ncalls to \u0027bpf_obj_free_fields()\u0027 in \u0027pcpu_copy_value()\u0027 could cause the\nmemory referenced by BPF_KPTR_{REF,PERCPU} fields to be held until the\nmap gets freed.\n\nFix this by calling \u0027bpf_obj_free_fields()\u0027 after\n\u0027copy_map_value[,_long]()\u0027 in \u0027pcpu_copy_value()\u0027.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68744",
"url": "https://www.suse.com/security/cve/CVE-2025-68744"
},
{
"category": "external",
"summary": "SUSE Bug 1255709 for CVE-2025-68744",
"url": "https://bugzilla.suse.com/1255709"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-68744"
},
{
"cve": "CVE-2025-68745",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68745"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla2xxx: Clear cmds after chip reset\n\nCommit aefed3e5548f (\"scsi: qla2xxx: target: Fix offline port handling\nand host reset handling\") caused two problems:\n\n1. Commands sent to FW, after chip reset got stuck and never freed as FW\n is not going to respond to them anymore.\n\n2. BUG_ON(cmd-\u003esg_mapped) in qlt_free_cmd(). Commit 26f9ce53817a\n (\"scsi: qla2xxx: Fix missed DMA unmap for aborted commands\")\n attempted to fix this, but introduced another bug under different\n circumstances when two different CPUs were racing to call\n qlt_unmap_sg() at the same time: BUG_ON(!valid_dma_direction(dir)) in\n dma_unmap_sg_attrs().\n\nSo revert \"scsi: qla2xxx: Fix missed DMA unmap for aborted commands\" and\npartially revert \"scsi: qla2xxx: target: Fix offline port handling and\nhost reset handling\" at __qla2x00_abort_all_cmds.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68745",
"url": "https://www.suse.com/security/cve/CVE-2025-68745"
},
{
"category": "external",
"summary": "SUSE Bug 1255721 for CVE-2025-68745",
"url": "https://bugzilla.suse.com/1255721"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-68745"
},
{
"cve": "CVE-2025-68746",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68746"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nspi: tegra210-quad: Fix timeout handling\n\nWhen the CPU that the QSPI interrupt handler runs on (typically CPU 0)\nis excessively busy, it can lead to rare cases of the IRQ thread not\nrunning before the transfer timeout is reached.\n\nWhile handling the timeouts, any pending transfers are cleaned up and\nthe message that they correspond to is marked as failed, which leaves\nthe curr_xfer field pointing at stale memory.\n\nTo avoid this, clear curr_xfer to NULL upon timeout and check for this\ncondition when the IRQ thread is finally run.\n\nWhile at it, also make sure to clear interrupts on failure so that new\ninterrupts can be run.\n\nA better, more involved, fix would move the interrupt clearing into a\nhard IRQ handler. Ideally we would also want to signal that the IRQ\nthread no longer needs to be run after the timeout is hit to avoid the\nextra check for a valid transfer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68746",
"url": "https://www.suse.com/security/cve/CVE-2025-68746"
},
{
"category": "external",
"summary": "SUSE Bug 1255722 for CVE-2025-68746",
"url": "https://bugzilla.suse.com/1255722"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-68746"
},
{
"cve": "CVE-2025-68747",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68747"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/panthor: Fix UAF on kernel BO VA nodes\n\nIf the MMU is down, panthor_vm_unmap_range() might return an error.\nWe expect the page table to be updated still, and if the MMU is blocked,\nthe rest of the GPU should be blocked too, so no risk of accessing\nphysical memory returned to the system (which the current code doesn\u0027t\ncover for anyway).\n\nProceed with the rest of the cleanup instead of bailing out and leaving\nthe va_node inserted in the drm_mm, which leads to UAF when other\nadjacent nodes are removed from the drm_mm tree.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68747",
"url": "https://www.suse.com/security/cve/CVE-2025-68747"
},
{
"category": "external",
"summary": "SUSE Bug 1255723 for CVE-2025-68747",
"url": "https://bugzilla.suse.com/1255723"
},
{
"category": "external",
"summary": "SUSE Bug 1257628 for CVE-2025-68747",
"url": "https://bugzilla.suse.com/1257628"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-68747"
},
{
"cve": "CVE-2025-68748",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68748"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/panthor: Fix UAF race between device unplug and FW event processing\n\nThe function panthor_fw_unplug() will free the FW memory sections.\nThe problem is that there could still be pending FW events which are yet\nnot handled at this point. process_fw_events_work() can in this case try\nto access said freed memory.\n\nSimply call disable_work_sync() to both drain and prevent future\ninvocation of process_fw_events_work().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68748",
"url": "https://www.suse.com/security/cve/CVE-2025-68748"
},
{
"category": "external",
"summary": "SUSE Bug 1255813 for CVE-2025-68748",
"url": "https://bugzilla.suse.com/1255813"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-68748"
},
{
"cve": "CVE-2025-68749",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68749"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\naccel/ivpu: Fix race condition when unbinding BOs\n\nFix \u0027Memory manager not clean during takedown\u0027 warning that occurs\nwhen ivpu_gem_bo_free() removes the BO from the BOs list before it\ngets unmapped. Then file_priv_unbind() triggers a warning in\ndrm_mm_takedown() during context teardown.\n\nProtect the unmapping sequence with bo_list_lock to ensure the BO is\nalways fully unmapped when removed from the list. This ensures the BO\nis either fully unmapped at context teardown time or present on the\nlist and unmapped by file_priv_unbind().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68749",
"url": "https://www.suse.com/security/cve/CVE-2025-68749"
},
{
"category": "external",
"summary": "SUSE Bug 1255724 for CVE-2025-68749",
"url": "https://bugzilla.suse.com/1255724"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-68749"
},
{
"cve": "CVE-2025-68751",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68751"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/fpu: Fix false-positive kmsan report in fpu_vstl()\n\nA false-positive kmsan report is detected when running ping command.\n\nAn inline assembly instruction \u0027vstl\u0027 can write varied amount of bytes\ndepending on value of \u0027index\u0027 argument. If \u0027index\u0027 \u003e 0, \u0027vstl\u0027 writes\nat least 2 bytes.\n\nclang generates kmsan write helper call depending on inline assembly\nconstraints. Constraints are evaluated compile-time, but value of\n\u0027index\u0027 argument is known only at runtime.\n\nclang currently generates call to __msan_instrument_asm_store with 1 byte\nas size. Manually call kmsan function to indicate correct amount of bytes\nwritten and fix false-positive report.\n\nThis change fixes following kmsan reports:\n\n[ 36.563119] =====================================================\n[ 36.563594] BUG: KMSAN: uninit-value in virtqueue_add+0x35c6/0x7c70\n[ 36.563852] virtqueue_add+0x35c6/0x7c70\n[ 36.564016] virtqueue_add_outbuf+0xa0/0xb0\n[ 36.564266] start_xmit+0x288c/0x4a20\n[ 36.564460] dev_hard_start_xmit+0x302/0x900\n[ 36.564649] sch_direct_xmit+0x340/0xea0\n[ 36.564894] __dev_queue_xmit+0x2e94/0x59b0\n[ 36.565058] neigh_resolve_output+0x936/0xb40\n[ 36.565278] __neigh_update+0x2f66/0x3a60\n[ 36.565499] neigh_update+0x52/0x60\n[ 36.565683] arp_process+0x1588/0x2de0\n[ 36.565916] NF_HOOK+0x1da/0x240\n[ 36.566087] arp_rcv+0x3e4/0x6e0\n[ 36.566306] __netif_receive_skb_list_core+0x1374/0x15a0\n[ 36.566527] netif_receive_skb_list_internal+0x1116/0x17d0\n[ 36.566710] napi_complete_done+0x376/0x740\n[ 36.566918] virtnet_poll+0x1bae/0x2910\n[ 36.567130] __napi_poll+0xf4/0x830\n[ 36.567294] net_rx_action+0x97c/0x1ed0\n[ 36.567556] handle_softirqs+0x306/0xe10\n[ 36.567731] irq_exit_rcu+0x14c/0x2e0\n[ 36.567910] do_io_irq+0xd4/0x120\n[ 36.568139] io_int_handler+0xc2/0xe8\n[ 36.568299] arch_cpu_idle+0xb0/0xc0\n[ 36.568540] arch_cpu_idle+0x76/0xc0\n[ 36.568726] default_idle_call+0x40/0x70\n[ 36.568953] do_idle+0x1d6/0x390\n[ 36.569486] cpu_startup_entry+0x9a/0xb0\n[ 36.569745] rest_init+0x1ea/0x290\n[ 36.570029] start_kernel+0x95e/0xb90\n[ 36.570348] startup_continue+0x2e/0x40\n[ 36.570703]\n[ 36.570798] Uninit was created at:\n[ 36.571002] kmem_cache_alloc_node_noprof+0x9e8/0x10e0\n[ 36.571261] kmalloc_reserve+0x12a/0x470\n[ 36.571553] __alloc_skb+0x310/0x860\n[ 36.571844] __ip_append_data+0x483e/0x6a30\n[ 36.572170] ip_append_data+0x11c/0x1e0\n[ 36.572477] raw_sendmsg+0x1c8c/0x2180\n[ 36.572818] inet_sendmsg+0xe6/0x190\n[ 36.573142] __sys_sendto+0x55e/0x8e0\n[ 36.573392] __s390x_sys_socketcall+0x19ae/0x2ba0\n[ 36.573571] __do_syscall+0x12e/0x240\n[ 36.573823] system_call+0x6e/0x90\n[ 36.573976]\n[ 36.574017] Byte 35 of 98 is uninitialized\n[ 36.574082] Memory access of size 98 starts at 0000000007aa0012\n[ 36.574218]\n[ 36.574325] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G B N 6.17.0-dirty #16 NONE\n[ 36.574541] Tainted: [B]=BAD_PAGE, [N]=TEST\n[ 36.574617] Hardware name: IBM 3931 A01 703 (KVM/Linux)\n[ 36.574755] =====================================================\n\n[ 63.532541] =====================================================\n[ 63.533639] BUG: KMSAN: uninit-value in virtqueue_add+0x35c6/0x7c70\n[ 63.533989] virtqueue_add+0x35c6/0x7c70\n[ 63.534940] virtqueue_add_outbuf+0xa0/0xb0\n[ 63.535861] start_xmit+0x288c/0x4a20\n[ 63.536708] dev_hard_start_xmit+0x302/0x900\n[ 63.537020] sch_direct_xmit+0x340/0xea0\n[ 63.537997] __dev_queue_xmit+0x2e94/0x59b0\n[ 63.538819] neigh_resolve_output+0x936/0xb40\n[ 63.539793] ip_finish_output2+0x1ee2/0x2200\n[ 63.540784] __ip_finish_output+0x272/0x7a0\n[ 63.541765] ip_finish_output+0x4e/0x5e0\n[ 63.542791] ip_output+0x166/0x410\n[ 63.543771] ip_push_pending_frames+0x1a2/0x470\n[ 63.544753] raw_sendmsg+0x1f06/0x2180\n[ 63.545033] inet_sendmsg+0xe6/0x190\n[ 63.546006] __sys_sendto+0x55e/0x8e0\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68751",
"url": "https://www.suse.com/security/cve/CVE-2025-68751"
},
{
"category": "external",
"summary": "SUSE Bug 1255945 for CVE-2025-68751",
"url": "https://bugzilla.suse.com/1255945"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2025-68751"
},
{
"cve": "CVE-2025-68752",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68752"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\niavf: Implement settime64 with -EOPNOTSUPP\n\nptp_clock_settime() assumes every ptp_clock has implemented settime64().\nStub it with -EOPNOTSUPP to prevent a NULL dereference.\n\nThe fix is similar to commit 329d050bbe63 (\"gve: Implement settime64\nwith -EOPNOTSUPP\").",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68752",
"url": "https://www.suse.com/security/cve/CVE-2025-68752"
},
{
"category": "external",
"summary": "SUSE Bug 1256237 for CVE-2025-68752",
"url": "https://bugzilla.suse.com/1256237"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/S:U/UI:N/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-68752"
},
{
"cve": "CVE-2025-68753",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68753"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: firewire-motu: add bounds check in put_user loop for DSP events\n\nIn the DSP event handling code, a put_user() loop copies event data.\nWhen the user buffer size is not aligned to 4 bytes, it could overwrite\nbeyond the buffer boundary.\n\nFix by adding a bounds check before put_user().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68753",
"url": "https://www.suse.com/security/cve/CVE-2025-68753"
},
{
"category": "external",
"summary": "SUSE Bug 1256238 for CVE-2025-68753",
"url": "https://bugzilla.suse.com/1256238"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-68753"
},
{
"cve": "CVE-2025-68754",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68754"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nrtc: amlogic-a4: fix double free caused by devm\n\nThe clock obtained via devm_clk_get_enabled() is automatically managed\nby devres and will be disabled and freed on driver detach. Manually\ncalling clk_disable_unprepare() in error path and remove function\ncauses double free.\n\nRemove the redundant clk_disable_unprepare() calls from the probe\nerror path and aml_rtc_remove(), allowing the devm framework to\nautomatically manage the clock lifecycle.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68754",
"url": "https://www.suse.com/security/cve/CVE-2025-68754"
},
{
"category": "external",
"summary": "SUSE Bug 1256240 for CVE-2025-68754",
"url": "https://bugzilla.suse.com/1256240"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-68754"
},
{
"cve": "CVE-2025-68755",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68755"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nstaging: most: remove broken i2c driver\n\nThe MOST I2C driver has been completely broken for five years without\nanyone noticing so remove the driver from staging.\n\nSpecifically, commit 723de0f9171e (\"staging: most: remove device from\ninterface structure\") started requiring drivers to set the interface\ndevice pointer before registration, but the I2C driver was never updated\nwhich results in a NULL pointer dereference if anyone ever tries to\nprobe it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68755",
"url": "https://www.suse.com/security/cve/CVE-2025-68755"
},
{
"category": "external",
"summary": "SUSE Bug 1255940 for CVE-2025-68755",
"url": "https://bugzilla.suse.com/1255940"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-68755"
},
{
"cve": "CVE-2025-68756",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68756"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nblock: Use RCU in blk_mq_[un]quiesce_tagset() instead of set-\u003etag_list_lock\n\nblk_mq_{add,del}_queue_tag_set() functions add and remove queues from\ntagset, the functions make sure that tagset and queues are marked as\nshared when two or more queues are attached to the same tagset.\nInitially a tagset starts as unshared and when the number of added\nqueues reaches two, blk_mq_add_queue_tag_set() marks it as shared along\nwith all the queues attached to it. When the number of attached queues\ndrops to 1 blk_mq_del_queue_tag_set() need to mark both the tagset and\nthe remaining queues as unshared.\n\nBoth functions need to freeze current queues in tagset before setting on\nunsetting BLK_MQ_F_TAG_QUEUE_SHARED flag. While doing so, both functions\nhold set-\u003etag_list_lock mutex, which makes sense as we do not want\nqueues to be added or deleted in the process. This used to work fine\nuntil commit 98d81f0df70c (\"nvme: use blk_mq_[un]quiesce_tagset\")\nmade the nvme driver quiesce tagset instead of quiscing individual\nqueues. blk_mq_quiesce_tagset() does the job and quiesce the queues in\nset-\u003etag_list while holding set-\u003etag_list_lock also.\n\nThis results in deadlock between two threads with these stacktraces:\n\n __schedule+0x47c/0xbb0\n ? timerqueue_add+0x66/0xb0\n schedule+0x1c/0xa0\n schedule_preempt_disabled+0xa/0x10\n __mutex_lock.constprop.0+0x271/0x600\n blk_mq_quiesce_tagset+0x25/0xc0\n nvme_dev_disable+0x9c/0x250\n nvme_timeout+0x1fc/0x520\n blk_mq_handle_expired+0x5c/0x90\n bt_iter+0x7e/0x90\n blk_mq_queue_tag_busy_iter+0x27e/0x550\n ? __blk_mq_complete_request_remote+0x10/0x10\n ? __blk_mq_complete_request_remote+0x10/0x10\n ? __call_rcu_common.constprop.0+0x1c0/0x210\n blk_mq_timeout_work+0x12d/0x170\n process_one_work+0x12e/0x2d0\n worker_thread+0x288/0x3a0\n ? rescuer_thread+0x480/0x480\n kthread+0xb8/0xe0\n ? kthread_park+0x80/0x80\n ret_from_fork+0x2d/0x50\n ? kthread_park+0x80/0x80\n ret_from_fork_asm+0x11/0x20\n\n __schedule+0x47c/0xbb0\n ? xas_find+0x161/0x1a0\n schedule+0x1c/0xa0\n blk_mq_freeze_queue_wait+0x3d/0x70\n ? destroy_sched_domains_rcu+0x30/0x30\n blk_mq_update_tag_set_shared+0x44/0x80\n blk_mq_exit_queue+0x141/0x150\n del_gendisk+0x25a/0x2d0\n nvme_ns_remove+0xc9/0x170\n nvme_remove_namespaces+0xc7/0x100\n nvme_remove+0x62/0x150\n pci_device_remove+0x23/0x60\n device_release_driver_internal+0x159/0x200\n unbind_store+0x99/0xa0\n kernfs_fop_write_iter+0x112/0x1e0\n vfs_write+0x2b1/0x3d0\n ksys_write+0x4e/0xb0\n do_syscall_64+0x5b/0x160\n entry_SYSCALL_64_after_hwframe+0x4b/0x53\n\nThe top stacktrace is showing nvme_timeout() called to handle nvme\ncommand timeout. timeout handler is trying to disable the controller and\nas a first step, it needs to blk_mq_quiesce_tagset() to tell blk-mq not\nto call queue callback handlers. The thread is stuck waiting for\nset-\u003etag_list_lock as it tries to walk the queues in set-\u003etag_list.\n\nThe lock is held by the second thread in the bottom stack which is\nwaiting for one of queues to be frozen. The queue usage counter will\ndrop to zero after nvme_timeout() finishes, and this will not happen\nbecause the thread will wait for this mutex forever.\n\nGiven that [un]quiescing queue is an operation that does not need to\nsleep, update blk_mq_[un]quiesce_tagset() to use RCU instead of taking\nset-\u003etag_list_lock, update blk_mq_{add,del}_queue_tag_set() to use RCU\nsafe list operations. Also, delete INIT_LIST_HEAD(\u0026q-\u003etag_set_list)\nin blk_mq_del_queue_tag_set() because we can not re-initialize it while\nthe list is being traversed under RCU. The deleted queue will not be\nadded/deleted to/from a tagset and it will be freed in blk_free_queue()\nafter the end of RCU grace period.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68756",
"url": "https://www.suse.com/security/cve/CVE-2025-68756"
},
{
"category": "external",
"summary": "SUSE Bug 1255942 for CVE-2025-68756",
"url": "https://bugzilla.suse.com/1255942"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-68756"
},
{
"cve": "CVE-2025-68757",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68757"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vgem-fence: Fix potential deadlock on release\n\nA timer that expires a vgem fence automatically in 10 seconds is now\nreleased with timer_delete_sync() from fence-\u003eops.release() called on last\ndma_fence_put(). In some scenarios, it can run in IRQ context, which is\nnot safe unless TIMER_IRQSAFE is used. One potentially risky scenario was\ndemonstrated in Intel DRM CI trybot, BAT run on machine bat-adlp-6, while\nworking on new IGT subtests syncobj_timeline@stress-* as user space\nreplacements of some problematic test cases of a dma-fence-chain selftest\n[1].\n\n[117.004338] ================================\n[117.004340] WARNING: inconsistent lock state\n[117.004342] 6.17.0-rc7-CI_DRM_17270-g7644974e648c+ #1 Tainted: G S U\n[117.004346] --------------------------------\n[117.004347] inconsistent {HARDIRQ-ON-W} -\u003e {IN-HARDIRQ-W} usage.\n[117.004349] swapper/0/0 [HC1[1]:SC1[1]:HE0:SE0] takes:\n[117.004352] ffff888138f86aa8 ((\u0026fence-\u003etimer)){?.-.}-{0:0}, at: __timer_delete_sync+0x4b/0x190\n[117.004361] {HARDIRQ-ON-W} state was registered at:\n[117.004363] lock_acquire+0xc4/0x2e0\n[117.004366] call_timer_fn+0x80/0x2a0\n[117.004368] __run_timers+0x231/0x310\n[117.004370] run_timer_softirq+0x76/0xe0\n[117.004372] handle_softirqs+0xd4/0x4d0\n[117.004375] __irq_exit_rcu+0x13f/0x160\n[117.004377] irq_exit_rcu+0xe/0x20\n[117.004379] sysvec_apic_timer_interrupt+0xa0/0xc0\n[117.004382] asm_sysvec_apic_timer_interrupt+0x1b/0x20\n[117.004385] cpuidle_enter_state+0x12b/0x8a0\n[117.004388] cpuidle_enter+0x2e/0x50\n[117.004393] call_cpuidle+0x22/0x60\n[117.004395] do_idle+0x1fd/0x260\n[117.004398] cpu_startup_entry+0x29/0x30\n[117.004401] start_secondary+0x12d/0x160\n[117.004404] common_startup_64+0x13e/0x141\n[117.004407] irq event stamp: 2282669\n[117.004409] hardirqs last enabled at (2282668): [\u003cffffffff8289db71\u003e] _raw_spin_unlock_irqrestore+0x51/0x80\n[117.004414] hardirqs last disabled at (2282669): [\u003cffffffff82882021\u003e] sysvec_irq_work+0x11/0xc0\n[117.004419] softirqs last enabled at (2254702): [\u003cffffffff8289fd00\u003e] __do_softirq+0x10/0x18\n[117.004423] softirqs last disabled at (2254725): [\u003cffffffff813d4ddf\u003e] __irq_exit_rcu+0x13f/0x160\n[117.004426]\nother info that might help us debug this:\n[117.004429] Possible unsafe locking scenario:\n[117.004432] CPU0\n[117.004433] ----\n[117.004434] lock((\u0026fence-\u003etimer));\n[117.004436] \u003cInterrupt\u003e\n[117.004438] lock((\u0026fence-\u003etimer));\n[117.004440]\n *** DEADLOCK ***\n[117.004443] 1 lock held by swapper/0/0:\n[117.004445] #0: ffffc90000003d50 ((\u0026fence-\u003etimer)){?.-.}-{0:0}, at: call_timer_fn+0x7a/0x2a0\n[117.004450]\nstack backtrace:\n[117.004453] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G S U 6.17.0-rc7-CI_DRM_17270-g7644974e648c+ #1 PREEMPT(voluntary)\n[117.004455] Tainted: [S]=CPU_OUT_OF_SPEC, [U]=USER\n[117.004455] Hardware name: Intel Corporation Alder Lake Client Platform/AlderLake-P DDR4 RVP, BIOS RPLPFWI1.R00.4035.A00.2301200723 01/20/2023\n[117.004456] Call Trace:\n[117.004456] \u003cIRQ\u003e\n[117.004457] dump_stack_lvl+0x91/0xf0\n[117.004460] dump_stack+0x10/0x20\n[117.004461] print_usage_bug.part.0+0x260/0x360\n[117.004463] mark_lock+0x76e/0x9c0\n[117.004465] ? register_lock_class+0x48/0x4a0\n[117.004467] __lock_acquire+0xbc3/0x2860\n[117.004469] lock_acquire+0xc4/0x2e0\n[117.004470] ? __timer_delete_sync+0x4b/0x190\n[117.004472] ? __timer_delete_sync+0x4b/0x190\n[117.004473] __timer_delete_sync+0x68/0x190\n[117.004474] ? __timer_delete_sync+0x4b/0x190\n[117.004475] timer_delete_sync+0x10/0x20\n[117.004476] vgem_fence_release+0x19/0x30 [vgem]\n[117.004478] dma_fence_release+0xc1/0x3b0\n[117.004480] ? dma_fence_release+0xa1/0x3b0\n[117.004481] dma_fence_chain_release+0xe7/0x130\n[117.004483] dma_fence_release+0xc1/0x3b0\n[117.004484] ? _raw_spin_unlock_irqrestore+0x27/0x80\n[117.004485] dma_fence_chain_irq_work+0x59/0x80\n[117.004487] irq_work_single+0x75/0xa0\n[117.004490] irq_work_r\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68757",
"url": "https://www.suse.com/security/cve/CVE-2025-68757"
},
{
"category": "external",
"summary": "SUSE Bug 1255943 for CVE-2025-68757",
"url": "https://bugzilla.suse.com/1255943"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-68757"
},
{
"cve": "CVE-2025-68758",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68758"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbacklight: led-bl: Add devlink to supplier LEDs\n\nLED Backlight is a consumer of one or multiple LED class devices, but\ndevlink is currently unable to create correct supplier-producer links when\nthe supplier is a class device. It creates instead a link where the\nsupplier is the parent of the expected device.\n\nOne consequence is that removal order is not correctly enforced.\n\nIssues happen for example with the following sections in a device tree\noverlay:\n\n // An LED driver chip\n pca9632@62 {\n compatible = \"nxp,pca9632\";\n reg = \u003c0x62\u003e;\n\n\t// ...\n\n addon_led_pwm: led-pwm@3 {\n reg = \u003c3\u003e;\n label = \"addon:led:pwm\";\n };\n };\n\n backlight-addon {\n compatible = \"led-backlight\";\n leds = \u003c\u0026addon_led_pwm\u003e;\n brightness-levels = \u003c255\u003e;\n default-brightness-level = \u003c255\u003e;\n };\n\nIn this example, the devlink should be created between the backlight-addon\n(consumer) and the pca9632@62 (supplier). Instead it is created between the\nbacklight-addon (consumer) and the parent of the pca9632@62, which is\ntypically the I2C bus adapter.\n\nOn removal of the above overlay, the LED driver can be removed before the\nbacklight device, resulting in:\n\n Unable to handle kernel NULL pointer dereference at virtual address 0000000000000010\n ...\n Call trace:\n led_put+0xe0/0x140\n devm_led_release+0x6c/0x98\n\nAnother way to reproduce the bug without any device tree overlays is\nunbinding the LED class device (pca9632@62) before unbinding the consumer\n(backlight-addon):\n\n echo 11-0062 \u003e/sys/bus/i2c/drivers/leds-pca963x/unbind\n echo ...backlight-dock \u003e/sys/bus/platform/drivers/led-backlight/unbind\n\nFix by adding a devlink between the consuming led-backlight device and the\nsupplying LED device, as other drivers and subsystems do as well.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68758",
"url": "https://www.suse.com/security/cve/CVE-2025-68758"
},
{
"category": "external",
"summary": "SUSE Bug 1255944 for CVE-2025-68758",
"url": "https://bugzilla.suse.com/1255944"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-68758"
},
{
"cve": "CVE-2025-68759",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68759"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: rtl818x: Fix potential memory leaks in rtl8180_init_rx_ring()\n\nIn rtl8180_init_rx_ring(), memory is allocated for skb packets and DMA\nallocations in a loop. When an allocation fails, the previously\nsuccessful allocations are not freed on exit.\n\nFix that by jumping to err_free_rings label on error, which calls\nrtl8180_free_rx_ring() to free the allocations. Remove the free of\nrx_ring in rtl8180_init_rx_ring() error path, and set the freed\npriv-\u003erx_buf entry to null, to avoid double free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68759",
"url": "https://www.suse.com/security/cve/CVE-2025-68759"
},
{
"category": "external",
"summary": "SUSE Bug 1255934 for CVE-2025-68759",
"url": "https://bugzilla.suse.com/1255934"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-68759"
},
{
"cve": "CVE-2025-68760",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68760"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\niommu/amd: Fix potential out-of-bounds read in iommu_mmio_show\n\nIn iommu_mmio_write(), it validates the user-provided offset with the\ncheck: `iommu-\u003edbg_mmio_offset \u003e iommu-\u003emmio_phys_end - 4`.\nThis assumes a 4-byte access. However, the corresponding\nshow handler, iommu_mmio_show(), uses readq() to perform an 8-byte\n(64-bit) read.\n\nIf a user provides an offset equal to `mmio_phys_end - 4`, the check\npasses, and will lead to a 4-byte out-of-bounds read.\n\nFix this by adjusting the boundary check to use sizeof(u64), which\ncorresponds to the size of the readq() operation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68760",
"url": "https://www.suse.com/security/cve/CVE-2025-68760"
},
{
"category": "external",
"summary": "SUSE Bug 1255935 for CVE-2025-68760",
"url": "https://bugzilla.suse.com/1255935"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-68760"
},
{
"cve": "CVE-2025-68761",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68761"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhfs: fix potential use after free in hfs_correct_next_unused_CNID()\n\nThis code calls hfs_bnode_put(node) which drops the refcount and then\ndreferences \"node\" on the next line. It\u0027s only safe to use \"node\"\nwhen we\u0027re holding a reference so flip these two lines around.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68761",
"url": "https://www.suse.com/security/cve/CVE-2025-68761"
},
{
"category": "external",
"summary": "SUSE Bug 1255936 for CVE-2025-68761",
"url": "https://bugzilla.suse.com/1255936"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-68761"
},
{
"cve": "CVE-2025-68762",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68762"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: netpoll: initialize work queue before error checks\n\nPrevent a kernel warning when netconsole setup fails on devices with\nIFF_DISABLE_NETPOLL flag. The warning (at kernel/workqueue.c:4242 in\n__flush_work) occurs because the cleanup path tries to cancel an\nuninitialized work queue.\n\nWhen __netpoll_setup() encounters a device with IFF_DISABLE_NETPOLL,\nit fails early and calls skb_pool_flush() for cleanup. This function\ncalls cancel_work_sync(\u0026np-\u003erefill_wq), but refill_wq hasn\u0027t been\ninitialized yet, triggering the warning.\n\nMove INIT_WORK() to the beginning of __netpoll_setup(), ensuring the\nwork queue is properly initialized before any potential failure points.\nThis allows the cleanup path to safely cancel the work queue regardless\nof where the setup fails.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68762",
"url": "https://www.suse.com/security/cve/CVE-2025-68762"
},
{
"category": "external",
"summary": "SUSE Bug 1255937 for CVE-2025-68762",
"url": "https://bugzilla.suse.com/1255937"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2025-68762"
},
{
"cve": "CVE-2025-68763",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68763"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: starfive - Correctly handle return of sg_nents_for_len\n\nThe return value of sg_nents_for_len was assigned to an unsigned long\nin starfive_hash_digest, causing negative error codes to be converted\nto large positive integers.\n\nAdd error checking for sg_nents_for_len and return immediately on\nfailure to prevent potential buffer overflows.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68763",
"url": "https://www.suse.com/security/cve/CVE-2025-68763"
},
{
"category": "external",
"summary": "SUSE Bug 1255929 for CVE-2025-68763",
"url": "https://bugzilla.suse.com/1255929"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-68763"
},
{
"cve": "CVE-2025-68764",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68764"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFS: Automounted filesystems should inherit ro,noexec,nodev,sync flags\n\nWhen a filesystem is being automounted, it needs to preserve the\nuser-set superblock mount options, such as the \"ro\" flag.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68764",
"url": "https://www.suse.com/security/cve/CVE-2025-68764"
},
{
"category": "external",
"summary": "SUSE Bug 1255930 for CVE-2025-68764",
"url": "https://bugzilla.suse.com/1255930"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-68764"
},
{
"cve": "CVE-2025-68765",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68765"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmt76: mt7615: Fix memory leak in mt7615_mcu_wtbl_sta_add()\n\nIn mt7615_mcu_wtbl_sta_add(), an skb sskb is allocated. If the\nsubsequent call to mt76_connac_mcu_alloc_wtbl_req() fails, the function\nreturns an error without freeing sskb, leading to a memory leak.\n\nFix this by calling dev_kfree_skb() on sskb in the error handling path\nto ensure it is properly released.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68765",
"url": "https://www.suse.com/security/cve/CVE-2025-68765"
},
{
"category": "external",
"summary": "SUSE Bug 1255931 for CVE-2025-68765",
"url": "https://bugzilla.suse.com/1255931"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-68765"
},
{
"cve": "CVE-2025-68766",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68766"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nirqchip/mchp-eic: Fix error code in mchp_eic_domain_alloc()\n\nIf irq_domain_translate_twocell() sets \"hwirq\" to \u003e= MCHP_EIC_NIRQ (2) then\nit results in an out of bounds access.\n\nThe code checks for invalid values, but doesn\u0027t set the error code. Return\n-EINVAL in that case, instead of returning success.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68766",
"url": "https://www.suse.com/security/cve/CVE-2025-68766"
},
{
"category": "external",
"summary": "SUSE Bug 1255932 for CVE-2025-68766",
"url": "https://bugzilla.suse.com/1255932"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-68766"
}
]
}
SUSE-SU-2026:20667-1
Vulnerability from csaf_suse - Published: 2026-03-11 15:14 - Updated: 2026-03-11 15:14| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise Micro 6.0 and Micro 6.1 kernel was updated to fix various security issues\n\nThe following security issues were fixed:\n\n- CVE-2023-53817: crypto: lib/mpi - avoid null pointer deref in mpi_cmp_ui() (bsc#1254992).\n- CVE-2025-37861: scsi: mpi3mr: Synchronous access b/w reset and tm thread for reply queue (bsc#1243055).\n- CVE-2025-39748: bpf: Forget ranges when refining tnum after JSET (bsc#1249587).\n- CVE-2025-39964: crypto: af_alg - Disallow concurrent writes in af_alg_sendmsg (bsc#1251966).\n- CVE-2025-40099: cifs: parse_dfs_referrals: prevent oob on malformed input (bsc#1252911).\n- CVE-2025-40103: smb: client: Fix refcount leak for cifs_sb_tlink (bsc#1252924).\n- CVE-2025-68283: libceph: replace BUG_ON with bounds check for map-\u003emax_osd (bsc#1255379).\n- CVE-2025-68295: smb: client: fix memory leak in cifs_construct_tcon() (bsc#1255129).\n- CVE-2025-68374: md: fix rcu protection in md_wakeup_thread (bsc#1255530).\n- CVE-2025-68736: landlock: Fix handling of disconnected directories (bsc#1255698).\n- CVE-2025-68778: btrfs: don\u0027t log conflicting inode if it\u0027s a dir moved in the current transaction (bsc#1256683).\n- CVE-2025-68785: net: openvswitch: fix middle attribute validation in push_nsh() action (bsc#1256640).\n- CVE-2025-68810: KVM: Disallow toggling KVM_MEM_GUEST_MEMFD on an existing memslot (bsc#1256679).\n- CVE-2025-71071: iommu/mediatek: fix use-after-free on probe deferral (bsc#1256802).\n- CVE-2025-71104: KVM: x86: Fix VM hard lockup after prolonged inactivity with periodic HV timer (bsc#1256708).\n- CVE-2025-71113: crypto: af_alg - zero initialize memory allocated via sock_kmalloc (bsc#1256716).\n- CVE-2025-71126: mptcp: reset fallback status gracefully at disconnect() time (bsc#1256755).\n- CVE-2025-71148: net/handshake: restore destructor on submit failure (bsc#1257159).\n- CVE-2025-71184: btrfs: fix NULL dereference on root when tracing inode eviction (bsc#1257635).\n- CVE-2025-71194: btrfs: fix deadlock in wait_current_trans() due to ignored transaction type (bsc#1257687).\n- CVE-2025-71225: md: suspend array while updating raid_disks via sysfs (bsc#1258411).\n- CVE-2026-22979: net: fix memory leak in skb_segment_list for GRO packets (bsc#1257228).\n- CVE-2026-22982: net: mscc: ocelot: Fix crash when adding interface under a lag (bsc#1257179).\n- CVE-2026-22998: nvme-tcp: fix NULL pointer dereferences in nvmet_tcp_build_pdu_iovec (bsc#1257209).\n- CVE-2026-23003: geneve: Fix incorrect inner network header offset when innerprotoinherit is set (bsc#1257246).\n- CVE-2026-23004: dst: fix races in rt6_uncached_list_del() and rt_del_uncached_list() (bsc#1257231).\n- CVE-2026-23017: idpf: fix error handling in the init_task on load (bsc#1257552).\n- CVE-2026-23035: net/mlx5e: Pass netdev to mlx5e_destroy_netdev instead of priv (bsc#1257559).\n- CVE-2026-23053: NFS: Fix a deadlock involving nfs_release_folio() (bsc#1257718).\n- CVE-2026-23057: vsock/virtio: Coalesce only linear skb (bsc#1257740).\n- CVE-2026-23060: crypto: authencesn - reject too-short AAD (assoclen\u003c8) to match ESP/ESN spec (bsc#1257735).\n- CVE-2026-23064: net/sched: act_ife: avoid possible NULL deref (bsc#1257765).\n- CVE-2026-23074: net/sched: Enforce that teql can only be used as root qdisc (bsc#1257749).\n- CVE-2026-23083: fou: Don\u0027t allow 0 for FOU_ATTR_IPPROTO (bsc#1257745).\n- CVE-2026-23084: be2net: Fix NULL pointer dereference in be_cmd_get_mac_from_list (bsc#1257830).\n- CVE-2026-23085: irqchip/gic-v3-its: Avoid truncating memory addresses (bsc#1257758).\n- CVE-2026-23086: vsock/virtio: cap TX credit to local buffer size (bsc#1257757).\n- CVE-2026-23089: ALSA: usb-audio: Fix use-after-free in snd_usb_mixer_free() (bsc#1257790).\n- CVE-2026-23095: gue: Fix skb memleak with inner IP protocol 0 (bsc#1257808).\n- CVE-2026-23099: bonding: limit BOND_MODE_8023AD to Ethernet devices (bsc#1257816).\n- CVE-2026-23102: arm64/fpsimd: signal: Mandate SVE payload for streaming-mode state (bsc#1257772).\n- CVE-2026-23104: ice: fix devlink reload call trace (bsc#1257763).\n- CVE-2026-23105: net/sched: qfq: Use cl_is_active to determine whether class is active in qfq_rm_from_ag (bsc#1257775).\n- CVE-2026-23107: arm64/fpsimd: signal: Allocate SSVE storage when restoring ZA (bsc#1257762).\n- CVE-2026-23110: scsi: core: Wake up the error handler when final completions race against each other (bsc#1257761).\n- CVE-2026-23111: netfilter: nf_tables: fix inverted genmask check in nft_map_catchall_activate() (bsc#1258181).\n- CVE-2026-23112: nvmet-tcp: add bounds checks in nvmet_tcp_build_pdu_iovec (bsc#1258184).\n- CVE-2026-23113: io_uring/io-wq: check IO_WQ_BIT_EXIT inside work run loop (bsc#1258278).\n- CVE-2026-23116: pmdomain: imx8m-blk-ctrl: Remove separate rst and clk mask for 8mq vpu (bsc#1258277).\n- CVE-2026-23119: bonding: provide a net pointer to __skb_flow_dissect() (bsc#1258273).\n- CVE-2026-23139: netfilter: nf_conncount: update last_gc only when GC has been performed (bsc#1258304).\n- CVE-2026-23141: btrfs: send: check for inline extents in range_is_hole_in_parent() (bsc#1258377).\n- CVE-2026-23166: ice: Fix NULL pointer dereference in ice_vsi_set_napi_queues (bsc#1258272).\n- CVE-2026-23171: net: bonding: update the slave array for broadcast mode (bsc#1258349).\n- CVE-2026-23173: net/mlx5e: TC, delete flows only for existing peers (bsc#1258520).\n- CVE-2026-23179: nvmet-tcp: fixup hang in nvmet_tcp_listen_data_ready() (bsc#1258394).\n- CVE-2026-23191: ALSA: aloop: Fix racy access at PCM trigger (bsc#1258395).\n- CVE-2026-23198: KVM: Don\u0027t clobber irqfd routing type when deassigning irqfd (bsc#1258321).\n- CVE-2026-23208: ALSA: usb-audio: Prevent excessive number of frames (bsc#1258468).\n- CVE-2026-23209: macvlan: fix error recovery in macvlan_common_newlink() (bsc#1258518).\n- CVE-2026-23213: drm/amd/pm: Disable MMIO access during SMU Mode 1 reset (bsc#1258465).\n- CVE-2026-23214: btrfs: reject new transactions if the fs is fully read-only (bsc#1258464).\n\nThe following non security issues were fixed:\n\n- ALSA: usb-audio: Update the number of packets properly at receiving (stable-fixes).\n- ALSA: usb-audio: fix broken logic in snd_audigy2nx_led_update() (git-fixes).\n- ASoC: SOF: ipc4-control: If there is no data do not send bytes update (git-fixes).\n- HID: intel-ish-hid: Update ishtp bus match to support device ID table (stable-fixes).\n- PM: sleep: wakeirq: Update outdated documentation comments (git-fixes).\n- Update \"drm/mgag200: fix mgag200_bmc_stop_scanout()\" bug number (bsc#1258153)\n- Update upstreamed net and powerpc patch references and sorting\n- bonding: only set speed/duplex to unknown, if getting speed failed (bsc#1253691).\n- btrfs: scrub: always update btrfs_scrub_progress::last_physical (git-fixes).\n- clocksource: Print durations for sync check unconditionally (bsc#1241345).\n- clocksource: Reduce watchdog readout delay limit to prevent false positives (bsc#1241345).\n- drm/radeon: delete radeon_fence_process in is_signaled, no deadlock (stable-fixes).\n- ext4: fix iloc.bh leak in ext4_xattr_inode_update_ref (git-fixes).\n- landlock: Optimize file path walks and prepare for audit support (bsc#1255698).\n- media: qcom: camss: vfe: Fix out-of-bounds access in vfe_isr_reg_update() (git-fixes).\n- shrink_slab_memcg: clear_bits of skipped shrinkers (bsc#1256564).\n- spi: tegra210-quad: Move curr_xfer read inside spinlock (bsc#1257952)\n- spi: tegra210-quad: Protect curr_xfer assignment in (bsc#1257952)\n- spi: tegra210-quad: Protect curr_xfer check in IRQ handler (bsc#1257952)\n- spi: tegra210-quad: Protect curr_xfer clearing in (bsc#1257952)\n- spi: tegra210-quad: Protect curr_xfer in tegra_qspi_combined_seq_xfer (bsc#1257952)\n- spi: tegra210-quad: Return IRQ_HANDLED when timeout already processed (bsc#1257952)\n- staging: rtl8723bs: fix missing status update on sdio_alloc_irq() failure (stable-fixes).\n- wifi: cfg80211: Fix use_for flag update on BSS refresh (git-fixes).\n- workqueue: mark power efficient workqueue as unbounded if (bsc#1257891)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-Micro-6.1-kernel-291",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_20667-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:20667-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620667-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:20667-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html"
},
{
"category": "self",
"summary": "SUSE Bug 1241345",
"url": "https://bugzilla.suse.com/1241345"
},
{
"category": "self",
"summary": "SUSE Bug 1243055",
"url": "https://bugzilla.suse.com/1243055"
},
{
"category": "self",
"summary": "SUSE Bug 1249587",
"url": "https://bugzilla.suse.com/1249587"
},
{
"category": "self",
"summary": "SUSE Bug 1251966",
"url": "https://bugzilla.suse.com/1251966"
},
{
"category": "self",
"summary": "SUSE Bug 1252911",
"url": "https://bugzilla.suse.com/1252911"
},
{
"category": "self",
"summary": "SUSE Bug 1252924",
"url": "https://bugzilla.suse.com/1252924"
},
{
"category": "self",
"summary": "SUSE Bug 1253691",
"url": "https://bugzilla.suse.com/1253691"
},
{
"category": "self",
"summary": "SUSE Bug 1254992",
"url": "https://bugzilla.suse.com/1254992"
},
{
"category": "self",
"summary": "SUSE Bug 1255129",
"url": "https://bugzilla.suse.com/1255129"
},
{
"category": "self",
"summary": "SUSE Bug 1255265",
"url": "https://bugzilla.suse.com/1255265"
},
{
"category": "self",
"summary": "SUSE Bug 1255379",
"url": "https://bugzilla.suse.com/1255379"
},
{
"category": "self",
"summary": "SUSE Bug 1255530",
"url": "https://bugzilla.suse.com/1255530"
},
{
"category": "self",
"summary": "SUSE Bug 1255698",
"url": "https://bugzilla.suse.com/1255698"
},
{
"category": "self",
"summary": "SUSE Bug 1256564",
"url": "https://bugzilla.suse.com/1256564"
},
{
"category": "self",
"summary": "SUSE Bug 1256640",
"url": "https://bugzilla.suse.com/1256640"
},
{
"category": "self",
"summary": "SUSE Bug 1256679",
"url": "https://bugzilla.suse.com/1256679"
},
{
"category": "self",
"summary": "SUSE Bug 1256683",
"url": "https://bugzilla.suse.com/1256683"
},
{
"category": "self",
"summary": "SUSE Bug 1256708",
"url": "https://bugzilla.suse.com/1256708"
},
{
"category": "self",
"summary": "SUSE Bug 1256716",
"url": "https://bugzilla.suse.com/1256716"
},
{
"category": "self",
"summary": "SUSE Bug 1256755",
"url": "https://bugzilla.suse.com/1256755"
},
{
"category": "self",
"summary": "SUSE Bug 1256802",
"url": "https://bugzilla.suse.com/1256802"
},
{
"category": "self",
"summary": "SUSE Bug 1256863",
"url": "https://bugzilla.suse.com/1256863"
},
{
"category": "self",
"summary": "SUSE Bug 1257159",
"url": "https://bugzilla.suse.com/1257159"
},
{
"category": "self",
"summary": "SUSE Bug 1257179",
"url": "https://bugzilla.suse.com/1257179"
},
{
"category": "self",
"summary": "SUSE Bug 1257209",
"url": "https://bugzilla.suse.com/1257209"
},
{
"category": "self",
"summary": "SUSE Bug 1257228",
"url": "https://bugzilla.suse.com/1257228"
},
{
"category": "self",
"summary": "SUSE Bug 1257231",
"url": "https://bugzilla.suse.com/1257231"
},
{
"category": "self",
"summary": "SUSE Bug 1257246",
"url": "https://bugzilla.suse.com/1257246"
},
{
"category": "self",
"summary": "SUSE Bug 1257552",
"url": "https://bugzilla.suse.com/1257552"
},
{
"category": "self",
"summary": "SUSE Bug 1257554",
"url": "https://bugzilla.suse.com/1257554"
},
{
"category": "self",
"summary": "SUSE Bug 1257557",
"url": "https://bugzilla.suse.com/1257557"
},
{
"category": "self",
"summary": "SUSE Bug 1257559",
"url": "https://bugzilla.suse.com/1257559"
},
{
"category": "self",
"summary": "SUSE Bug 1257560",
"url": "https://bugzilla.suse.com/1257560"
},
{
"category": "self",
"summary": "SUSE Bug 1257562",
"url": "https://bugzilla.suse.com/1257562"
},
{
"category": "self",
"summary": "SUSE Bug 1257570",
"url": "https://bugzilla.suse.com/1257570"
},
{
"category": "self",
"summary": "SUSE Bug 1257573",
"url": "https://bugzilla.suse.com/1257573"
},
{
"category": "self",
"summary": "SUSE Bug 1257576",
"url": "https://bugzilla.suse.com/1257576"
},
{
"category": "self",
"summary": "SUSE Bug 1257579",
"url": "https://bugzilla.suse.com/1257579"
},
{
"category": "self",
"summary": "SUSE Bug 1257580",
"url": "https://bugzilla.suse.com/1257580"
},
{
"category": "self",
"summary": "SUSE Bug 1257586",
"url": "https://bugzilla.suse.com/1257586"
},
{
"category": "self",
"summary": "SUSE Bug 1257635",
"url": "https://bugzilla.suse.com/1257635"
},
{
"category": "self",
"summary": "SUSE Bug 1257679",
"url": "https://bugzilla.suse.com/1257679"
},
{
"category": "self",
"summary": "SUSE Bug 1257687",
"url": "https://bugzilla.suse.com/1257687"
},
{
"category": "self",
"summary": "SUSE Bug 1257704",
"url": "https://bugzilla.suse.com/1257704"
},
{
"category": "self",
"summary": "SUSE Bug 1257706",
"url": "https://bugzilla.suse.com/1257706"
},
{
"category": "self",
"summary": "SUSE Bug 1257707",
"url": "https://bugzilla.suse.com/1257707"
},
{
"category": "self",
"summary": "SUSE Bug 1257714",
"url": "https://bugzilla.suse.com/1257714"
},
{
"category": "self",
"summary": "SUSE Bug 1257715",
"url": "https://bugzilla.suse.com/1257715"
},
{
"category": "self",
"summary": "SUSE Bug 1257716",
"url": "https://bugzilla.suse.com/1257716"
},
{
"category": "self",
"summary": "SUSE Bug 1257718",
"url": "https://bugzilla.suse.com/1257718"
},
{
"category": "self",
"summary": "SUSE Bug 1257722",
"url": "https://bugzilla.suse.com/1257722"
},
{
"category": "self",
"summary": "SUSE Bug 1257723",
"url": "https://bugzilla.suse.com/1257723"
},
{
"category": "self",
"summary": "SUSE Bug 1257729",
"url": "https://bugzilla.suse.com/1257729"
},
{
"category": "self",
"summary": "SUSE Bug 1257735",
"url": "https://bugzilla.suse.com/1257735"
},
{
"category": "self",
"summary": "SUSE Bug 1257739",
"url": "https://bugzilla.suse.com/1257739"
},
{
"category": "self",
"summary": "SUSE Bug 1257740",
"url": "https://bugzilla.suse.com/1257740"
},
{
"category": "self",
"summary": "SUSE Bug 1257741",
"url": "https://bugzilla.suse.com/1257741"
},
{
"category": "self",
"summary": "SUSE Bug 1257743",
"url": "https://bugzilla.suse.com/1257743"
},
{
"category": "self",
"summary": "SUSE Bug 1257745",
"url": "https://bugzilla.suse.com/1257745"
},
{
"category": "self",
"summary": "SUSE Bug 1257749",
"url": "https://bugzilla.suse.com/1257749"
},
{
"category": "self",
"summary": "SUSE Bug 1257750",
"url": "https://bugzilla.suse.com/1257750"
},
{
"category": "self",
"summary": "SUSE Bug 1257757",
"url": "https://bugzilla.suse.com/1257757"
},
{
"category": "self",
"summary": "SUSE Bug 1257758",
"url": "https://bugzilla.suse.com/1257758"
},
{
"category": "self",
"summary": "SUSE Bug 1257759",
"url": "https://bugzilla.suse.com/1257759"
},
{
"category": "self",
"summary": "SUSE Bug 1257761",
"url": "https://bugzilla.suse.com/1257761"
},
{
"category": "self",
"summary": "SUSE Bug 1257762",
"url": "https://bugzilla.suse.com/1257762"
},
{
"category": "self",
"summary": "SUSE Bug 1257763",
"url": "https://bugzilla.suse.com/1257763"
},
{
"category": "self",
"summary": "SUSE Bug 1257765",
"url": "https://bugzilla.suse.com/1257765"
},
{
"category": "self",
"summary": "SUSE Bug 1257768",
"url": "https://bugzilla.suse.com/1257768"
},
{
"category": "self",
"summary": "SUSE Bug 1257770",
"url": "https://bugzilla.suse.com/1257770"
},
{
"category": "self",
"summary": "SUSE Bug 1257772",
"url": "https://bugzilla.suse.com/1257772"
},
{
"category": "self",
"summary": "SUSE Bug 1257775",
"url": "https://bugzilla.suse.com/1257775"
},
{
"category": "self",
"summary": "SUSE Bug 1257776",
"url": "https://bugzilla.suse.com/1257776"
},
{
"category": "self",
"summary": "SUSE Bug 1257788",
"url": "https://bugzilla.suse.com/1257788"
},
{
"category": "self",
"summary": "SUSE Bug 1257789",
"url": "https://bugzilla.suse.com/1257789"
},
{
"category": "self",
"summary": "SUSE Bug 1257790",
"url": "https://bugzilla.suse.com/1257790"
},
{
"category": "self",
"summary": "SUSE Bug 1257805",
"url": "https://bugzilla.suse.com/1257805"
},
{
"category": "self",
"summary": "SUSE Bug 1257808",
"url": "https://bugzilla.suse.com/1257808"
},
{
"category": "self",
"summary": "SUSE Bug 1257809",
"url": "https://bugzilla.suse.com/1257809"
},
{
"category": "self",
"summary": "SUSE Bug 1257811",
"url": "https://bugzilla.suse.com/1257811"
},
{
"category": "self",
"summary": "SUSE Bug 1257813",
"url": "https://bugzilla.suse.com/1257813"
},
{
"category": "self",
"summary": "SUSE Bug 1257816",
"url": "https://bugzilla.suse.com/1257816"
},
{
"category": "self",
"summary": "SUSE Bug 1257830",
"url": "https://bugzilla.suse.com/1257830"
},
{
"category": "self",
"summary": "SUSE Bug 1257891",
"url": "https://bugzilla.suse.com/1257891"
},
{
"category": "self",
"summary": "SUSE Bug 1257942",
"url": "https://bugzilla.suse.com/1257942"
},
{
"category": "self",
"summary": "SUSE Bug 1257952",
"url": "https://bugzilla.suse.com/1257952"
},
{
"category": "self",
"summary": "SUSE Bug 1258153",
"url": "https://bugzilla.suse.com/1258153"
},
{
"category": "self",
"summary": "SUSE Bug 1258181",
"url": "https://bugzilla.suse.com/1258181"
},
{
"category": "self",
"summary": "SUSE Bug 1258184",
"url": "https://bugzilla.suse.com/1258184"
},
{
"category": "self",
"summary": "SUSE Bug 1258222",
"url": "https://bugzilla.suse.com/1258222"
},
{
"category": "self",
"summary": "SUSE Bug 1258234",
"url": "https://bugzilla.suse.com/1258234"
},
{
"category": "self",
"summary": "SUSE Bug 1258237",
"url": "https://bugzilla.suse.com/1258237"
},
{
"category": "self",
"summary": "SUSE Bug 1258245",
"url": "https://bugzilla.suse.com/1258245"
},
{
"category": "self",
"summary": "SUSE Bug 1258249",
"url": "https://bugzilla.suse.com/1258249"
},
{
"category": "self",
"summary": "SUSE Bug 1258252",
"url": "https://bugzilla.suse.com/1258252"
},
{
"category": "self",
"summary": "SUSE Bug 1258256",
"url": "https://bugzilla.suse.com/1258256"
},
{
"category": "self",
"summary": "SUSE Bug 1258259",
"url": "https://bugzilla.suse.com/1258259"
},
{
"category": "self",
"summary": "SUSE Bug 1258272",
"url": "https://bugzilla.suse.com/1258272"
},
{
"category": "self",
"summary": "SUSE Bug 1258273",
"url": "https://bugzilla.suse.com/1258273"
},
{
"category": "self",
"summary": "SUSE Bug 1258277",
"url": "https://bugzilla.suse.com/1258277"
},
{
"category": "self",
"summary": "SUSE Bug 1258278",
"url": "https://bugzilla.suse.com/1258278"
},
{
"category": "self",
"summary": "SUSE Bug 1258279",
"url": "https://bugzilla.suse.com/1258279"
},
{
"category": "self",
"summary": "SUSE Bug 1258299",
"url": "https://bugzilla.suse.com/1258299"
},
{
"category": "self",
"summary": "SUSE Bug 1258304",
"url": "https://bugzilla.suse.com/1258304"
},
{
"category": "self",
"summary": "SUSE Bug 1258309",
"url": "https://bugzilla.suse.com/1258309"
},
{
"category": "self",
"summary": "SUSE Bug 1258313",
"url": "https://bugzilla.suse.com/1258313"
},
{
"category": "self",
"summary": "SUSE Bug 1258317",
"url": "https://bugzilla.suse.com/1258317"
},
{
"category": "self",
"summary": "SUSE Bug 1258321",
"url": "https://bugzilla.suse.com/1258321"
},
{
"category": "self",
"summary": "SUSE Bug 1258326",
"url": "https://bugzilla.suse.com/1258326"
},
{
"category": "self",
"summary": "SUSE Bug 1258338",
"url": "https://bugzilla.suse.com/1258338"
},
{
"category": "self",
"summary": "SUSE Bug 1258349",
"url": "https://bugzilla.suse.com/1258349"
},
{
"category": "self",
"summary": "SUSE Bug 1258354",
"url": "https://bugzilla.suse.com/1258354"
},
{
"category": "self",
"summary": "SUSE Bug 1258358",
"url": "https://bugzilla.suse.com/1258358"
},
{
"category": "self",
"summary": "SUSE Bug 1258374",
"url": "https://bugzilla.suse.com/1258374"
},
{
"category": "self",
"summary": "SUSE Bug 1258377",
"url": "https://bugzilla.suse.com/1258377"
},
{
"category": "self",
"summary": "SUSE Bug 1258379",
"url": "https://bugzilla.suse.com/1258379"
},
{
"category": "self",
"summary": "SUSE Bug 1258394",
"url": "https://bugzilla.suse.com/1258394"
},
{
"category": "self",
"summary": "SUSE Bug 1258395",
"url": "https://bugzilla.suse.com/1258395"
},
{
"category": "self",
"summary": "SUSE Bug 1258397",
"url": "https://bugzilla.suse.com/1258397"
},
{
"category": "self",
"summary": "SUSE Bug 1258411",
"url": "https://bugzilla.suse.com/1258411"
},
{
"category": "self",
"summary": "SUSE Bug 1258415",
"url": "https://bugzilla.suse.com/1258415"
},
{
"category": "self",
"summary": "SUSE Bug 1258419",
"url": "https://bugzilla.suse.com/1258419"
},
{
"category": "self",
"summary": "SUSE Bug 1258422",
"url": "https://bugzilla.suse.com/1258422"
},
{
"category": "self",
"summary": "SUSE Bug 1258424",
"url": "https://bugzilla.suse.com/1258424"
},
{
"category": "self",
"summary": "SUSE Bug 1258429",
"url": "https://bugzilla.suse.com/1258429"
},
{
"category": "self",
"summary": "SUSE Bug 1258442",
"url": "https://bugzilla.suse.com/1258442"
},
{
"category": "self",
"summary": "SUSE Bug 1258464",
"url": "https://bugzilla.suse.com/1258464"
},
{
"category": "self",
"summary": "SUSE Bug 1258465",
"url": "https://bugzilla.suse.com/1258465"
},
{
"category": "self",
"summary": "SUSE Bug 1258468",
"url": "https://bugzilla.suse.com/1258468"
},
{
"category": "self",
"summary": "SUSE Bug 1258469",
"url": "https://bugzilla.suse.com/1258469"
},
{
"category": "self",
"summary": "SUSE Bug 1258484",
"url": "https://bugzilla.suse.com/1258484"
},
{
"category": "self",
"summary": "SUSE Bug 1258518",
"url": "https://bugzilla.suse.com/1258518"
},
{
"category": "self",
"summary": "SUSE Bug 1258519",
"url": "https://bugzilla.suse.com/1258519"
},
{
"category": "self",
"summary": "SUSE Bug 1258520",
"url": "https://bugzilla.suse.com/1258520"
},
{
"category": "self",
"summary": "SUSE Bug 1258524",
"url": "https://bugzilla.suse.com/1258524"
},
{
"category": "self",
"summary": "SUSE Bug 1258544",
"url": "https://bugzilla.suse.com/1258544"
},
{
"category": "self",
"summary": "SUSE Bug 1258660",
"url": "https://bugzilla.suse.com/1258660"
},
{
"category": "self",
"summary": "SUSE Bug 1258824",
"url": "https://bugzilla.suse.com/1258824"
},
{
"category": "self",
"summary": "SUSE Bug 1258928",
"url": "https://bugzilla.suse.com/1258928"
},
{
"category": "self",
"summary": "SUSE Bug 1259070",
"url": "https://bugzilla.suse.com/1259070"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53817 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53817/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-37861 page",
"url": "https://www.suse.com/security/cve/CVE-2025-37861/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39748 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39748/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39964 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39964/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40099 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40099/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40103 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40103/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68283 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68283/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68295 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68295/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68374 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68374/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68736 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68736/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68778 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68778/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68785 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68785/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68810 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68810/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71071 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71071/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71104 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71104/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71113 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71113/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71126 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71126/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71148 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71148/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71182 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71182/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71184 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71184/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71185 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71185/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71188 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71188/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71189 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71189/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71190 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71190/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71191 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71191/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71192 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71192/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71194 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71194/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71195 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71195/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71196 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71196/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71197 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71197/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71198 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71198/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71199 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71199/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71200 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71200/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71222 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71222/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71224 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71224/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71225 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71225/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71229 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71229/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71231 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71231/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71232 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71232/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71234 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71234/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71235 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71235/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71236 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71236/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-22979 page",
"url": "https://www.suse.com/security/cve/CVE-2026-22979/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-22982 page",
"url": "https://www.suse.com/security/cve/CVE-2026-22982/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-22998 page",
"url": "https://www.suse.com/security/cve/CVE-2026-22998/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23003 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23003/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23004 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23004/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23017 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23017/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23021 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23021/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23026 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23026/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23033 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23033/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23035 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23035/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23037 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23037/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23049 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23049/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23053 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23053/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23056 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23056/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23057 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23057/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23058 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23058/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23060 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23060/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23061 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23061/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23063 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23063/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23064 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23064/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23068 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23068/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23071 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23071/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23073 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23073/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23074 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23074/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23076 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23076/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23078 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23078/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23080 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23080/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23082 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23082/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23083 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23083/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23084 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23084/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23085 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23085/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23086 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23086/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23089 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23089/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23090 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23090/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23091 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23091/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23094 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23094/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23095 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23095/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23096 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23096/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23099 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23099/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23101 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23101/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23102 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23102/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23104 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23104/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23105 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23105/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23107 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23107/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23108 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23108/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23110 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23110/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23111 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23111/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23112 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23112/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23113 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23113/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23116 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23116/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23119 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23119/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23121 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23121/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23129 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23129/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23133 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23133/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23135 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23135/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23139 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23141 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23145 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23145/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23146 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23146/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23150 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23150/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23151 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23151/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23152 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23152/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23155 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23155/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23156 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23156/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23163 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23163/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23166 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23166/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23167 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23167/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23170 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23170/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23171 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23171/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23172 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23172/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23173 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23173/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23176 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23176/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23178 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23178/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23179 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23179/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23182 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23182/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23190 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23190/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23191 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23191/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23198 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23198/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23202 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23202/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23207 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23207/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23208 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23208/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23209 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23209/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23213 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23213/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23214 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23214/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23221 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23221/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23222 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23222/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23229 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23229/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2026-03-11T15:14:55Z",
"generator": {
"date": "2026-03-11T15:14:55Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:20667-1",
"initial_release_date": "2026-03-11T15:14:55Z",
"revision_history": [
{
"date": "2026-03-11T15:14:55Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-6.4.0-40.1.aarch64",
"product": {
"name": "kernel-default-6.4.0-40.1.aarch64",
"product_id": "kernel-default-6.4.0-40.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-6.4.0-40.1.21.17.aarch64",
"product": {
"name": "kernel-default-base-6.4.0-40.1.21.17.aarch64",
"product_id": "kernel-default-base-6.4.0-40.1.21.17.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-6.4.0-40.1.aarch64",
"product": {
"name": "kernel-default-devel-6.4.0-40.1.aarch64",
"product_id": "kernel-default-devel-6.4.0-40.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-6.4.0-40.1.noarch",
"product": {
"name": "kernel-devel-6.4.0-40.1.noarch",
"product_id": "kernel-devel-6.4.0-40.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-6.4.0-40.1.noarch",
"product": {
"name": "kernel-macros-6.4.0-40.1.noarch",
"product_id": "kernel-macros-6.4.0-40.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-6.4.0-40.1.noarch",
"product": {
"name": "kernel-source-6.4.0-40.1.noarch",
"product_id": "kernel-source-6.4.0-40.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-6.4.0-40.1.ppc64le",
"product": {
"name": "kernel-default-6.4.0-40.1.ppc64le",
"product_id": "kernel-default-6.4.0-40.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"product": {
"name": "kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"product_id": "kernel-default-base-6.4.0-40.1.21.17.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-6.4.0-40.1.ppc64le",
"product": {
"name": "kernel-default-devel-6.4.0-40.1.ppc64le",
"product_id": "kernel-default-devel-6.4.0-40.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-6.4.0-40.1.s390x",
"product": {
"name": "kernel-default-6.4.0-40.1.s390x",
"product_id": "kernel-default-6.4.0-40.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-6.4.0-40.1.s390x",
"product": {
"name": "kernel-default-devel-6.4.0-40.1.s390x",
"product_id": "kernel-default-devel-6.4.0-40.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-6.4.0-40.1.s390x",
"product": {
"name": "kernel-default-livepatch-6.4.0-40.1.s390x",
"product_id": "kernel-default-livepatch-6.4.0-40.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-6.4.0-40.1.x86_64",
"product": {
"name": "kernel-default-6.4.0-40.1.x86_64",
"product_id": "kernel-default-6.4.0-40.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-6.4.0-40.1.21.17.x86_64",
"product": {
"name": "kernel-default-base-6.4.0-40.1.21.17.x86_64",
"product_id": "kernel-default-base-6.4.0-40.1.21.17.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-6.4.0-40.1.x86_64",
"product": {
"name": "kernel-default-devel-6.4.0-40.1.x86_64",
"product_id": "kernel-default-devel-6.4.0-40.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-6.4.0-40.1.x86_64",
"product": {
"name": "kernel-default-livepatch-6.4.0-40.1.x86_64",
"product_id": "kernel-default-livepatch-6.4.0-40.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-6.4.0-40.1.x86_64",
"product": {
"name": "kernel-kvmsmall-6.4.0-40.1.x86_64",
"product_id": "kernel-kvmsmall-6.4.0-40.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Micro 6.1",
"product": {
"name": "SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sl-micro:6.1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.4.0-40.1.aarch64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64"
},
"product_reference": "kernel-default-6.4.0-40.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.4.0-40.1.ppc64le as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le"
},
"product_reference": "kernel-default-6.4.0-40.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.4.0-40.1.s390x as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x"
},
"product_reference": "kernel-default-6.4.0-40.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.4.0-40.1.x86_64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64"
},
"product_reference": "kernel-default-6.4.0-40.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.4.0-40.1.21.17.aarch64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64"
},
"product_reference": "kernel-default-base-6.4.0-40.1.21.17.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.4.0-40.1.21.17.ppc64le as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le"
},
"product_reference": "kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.4.0-40.1.21.17.x86_64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64"
},
"product_reference": "kernel-default-base-6.4.0-40.1.21.17.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.4.0-40.1.aarch64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64"
},
"product_reference": "kernel-default-devel-6.4.0-40.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.4.0-40.1.ppc64le as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le"
},
"product_reference": "kernel-default-devel-6.4.0-40.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.4.0-40.1.s390x as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x"
},
"product_reference": "kernel-default-devel-6.4.0-40.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.4.0-40.1.x86_64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64"
},
"product_reference": "kernel-default-devel-6.4.0-40.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-6.4.0-40.1.s390x as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x"
},
"product_reference": "kernel-default-livepatch-6.4.0-40.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-6.4.0-40.1.x86_64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64"
},
"product_reference": "kernel-default-livepatch-6.4.0-40.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-6.4.0-40.1.noarch as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch"
},
"product_reference": "kernel-devel-6.4.0-40.1.noarch",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-6.4.0-40.1.x86_64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64"
},
"product_reference": "kernel-kvmsmall-6.4.0-40.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-6.4.0-40.1.noarch as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch"
},
"product_reference": "kernel-macros-6.4.0-40.1.noarch",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-6.4.0-40.1.noarch as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
},
"product_reference": "kernel-source-6.4.0-40.1.noarch",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-53817",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53817"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: lib/mpi - avoid null pointer deref in mpi_cmp_ui()\n\nDuring NVMeTCP Authentication a controller can trigger a kernel\noops by specifying the 8192 bit Diffie Hellman group and passing\na correctly sized, but zeroed Diffie Hellamn value.\nmpi_cmp_ui() was detecting this if the second parameter was 0,\nbut 1 is passed from dh_is_pubkey_valid(). This causes the null\npointer u-\u003ed to be dereferenced towards the end of mpi_cmp_ui()",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53817",
"url": "https://www.suse.com/security/cve/CVE-2023-53817"
},
{
"category": "external",
"summary": "SUSE Bug 1254992 for CVE-2023-53817",
"url": "https://bugzilla.suse.com/1254992"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2023-53817"
},
{
"cve": "CVE-2025-37861",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-37861"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mpi3mr: Synchronous access b/w reset and tm thread for reply queue\n\nWhen the task management thread processes reply queues while the reset\nthread resets them, the task management thread accesses an invalid queue ID\n(0xFFFF), set by the reset thread, which points to unallocated memory,\ncausing a crash.\n\nAdd flag \u0027io_admin_reset_sync\u0027 to synchronize access between the reset,\nI/O, and admin threads. Before a reset, the reset handler sets this flag to\nblock I/O and admin processing threads. If any thread bypasses the initial\ncheck, the reset thread waits up to 10 seconds for processing to finish. If\nthe wait exceeds 10 seconds, the controller is marked as unrecoverable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-37861",
"url": "https://www.suse.com/security/cve/CVE-2025-37861"
},
{
"category": "external",
"summary": "SUSE Bug 1243055 for CVE-2025-37861",
"url": "https://bugzilla.suse.com/1243055"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2025-37861"
},
{
"cve": "CVE-2025-39748",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39748"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Forget ranges when refining tnum after JSET\n\nSyzbot reported a kernel warning due to a range invariant violation on\nthe following BPF program.\n\n 0: call bpf_get_netns_cookie\n 1: if r0 == 0 goto \u003cexit\u003e\n 2: if r0 \u0026 Oxffffffff goto \u003cexit\u003e\n\nThe issue is on the path where we fall through both jumps.\n\nThat path is unreachable at runtime: after insn 1, we know r0 != 0, but\nwith the sign extension on the jset, we would only fallthrough insn 2\nif r0 == 0. Unfortunately, is_branch_taken() isn\u0027t currently able to\nfigure this out, so the verifier walks all branches. The verifier then\nrefines the register bounds using the second condition and we end\nup with inconsistent bounds on this unreachable path:\n\n 1: if r0 == 0 goto \u003cexit\u003e\n r0: u64=[0x1, 0xffffffffffffffff] var_off=(0, 0xffffffffffffffff)\n 2: if r0 \u0026 0xffffffff goto \u003cexit\u003e\n r0 before reg_bounds_sync: u64=[0x1, 0xffffffffffffffff] var_off=(0, 0)\n r0 after reg_bounds_sync: u64=[0x1, 0] var_off=(0, 0)\n\nImproving the range refinement for JSET to cover all cases is tricky. We\nalso don\u0027t expect many users to rely on JSET given LLVM doesn\u0027t generate\nthose instructions. So instead of improving the range refinement for\nJSETs, Eduard suggested we forget the ranges whenever we\u0027re narrowing\ntnums after a JSET. This patch implements that approach.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39748",
"url": "https://www.suse.com/security/cve/CVE-2025-39748"
},
{
"category": "external",
"summary": "SUSE Bug 1249587 for CVE-2025-39748",
"url": "https://bugzilla.suse.com/1249587"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2025-39748"
},
{
"cve": "CVE-2025-39964",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39964"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: af_alg - Disallow concurrent writes in af_alg_sendmsg\n\nIssuing two writes to the same af_alg socket is bogus as the\ndata will be interleaved in an unpredictable fashion. Furthermore,\nconcurrent writes may create inconsistencies in the internal\nsocket state.\n\nDisallow this by adding a new ctx-\u003ewrite field that indiciates\nexclusive ownership for writing.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39964",
"url": "https://www.suse.com/security/cve/CVE-2025-39964"
},
{
"category": "external",
"summary": "SUSE Bug 1251966 for CVE-2025-39964",
"url": "https://bugzilla.suse.com/1251966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2025-39964"
},
{
"cve": "CVE-2025-40099",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40099"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncifs: parse_dfs_referrals: prevent oob on malformed input\n\nMalicious SMB server can send invalid reply to FSCTL_DFS_GET_REFERRALS\n\n- reply smaller than sizeof(struct get_dfs_referral_rsp)\n- reply with number of referrals smaller than NumberOfReferrals in the\nheader\n\nProcessing of such replies will cause oob.\n\nReturn -EINVAL error on such replies to prevent oob-s.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40099",
"url": "https://www.suse.com/security/cve/CVE-2025-40099"
},
{
"category": "external",
"summary": "SUSE Bug 1252911 for CVE-2025-40099",
"url": "https://bugzilla.suse.com/1252911"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2025-40099"
},
{
"cve": "CVE-2025-40103",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40103"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: Fix refcount leak for cifs_sb_tlink\n\nFix three refcount inconsistency issues related to `cifs_sb_tlink`.\n\nComments for `cifs_sb_tlink` state that `cifs_put_tlink()` needs to be\ncalled after successful calls to `cifs_sb_tlink()`. Three calls fail to\nupdate refcount accordingly, leading to possible resource leaks.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40103",
"url": "https://www.suse.com/security/cve/CVE-2025-40103"
},
{
"category": "external",
"summary": "SUSE Bug 1252924 for CVE-2025-40103",
"url": "https://bugzilla.suse.com/1252924"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "low"
}
],
"title": "CVE-2025-40103"
},
{
"cve": "CVE-2025-68283",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68283"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nlibceph: replace BUG_ON with bounds check for map-\u003emax_osd\n\nOSD indexes come from untrusted network packets. Boundary checks are\nadded to validate these against map-\u003emax_osd.\n\n[ idryomov: drop BUG_ON in ceph_get_primary_affinity(), minor cosmetic\n edits ]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68283",
"url": "https://www.suse.com/security/cve/CVE-2025-68283"
},
{
"category": "external",
"summary": "SUSE Bug 1255379 for CVE-2025-68283",
"url": "https://bugzilla.suse.com/1255379"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2025-68283"
},
{
"cve": "CVE-2025-68295",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68295"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: fix memory leak in cifs_construct_tcon()\n\nWhen having a multiuser mount with domain= specified and using\ncifscreds, cifs_set_cifscreds() will end up setting @ctx-\u003edomainname,\nso it needs to be freed before leaving cifs_construct_tcon().\n\nThis fixes the following memory leak reported by kmemleak:\n\n mount.cifs //srv/share /mnt -o domain=ZELDA,multiuser,...\n su - testuser\n cifscreds add -d ZELDA -u testuser\n ...\n ls /mnt/1\n ...\n umount /mnt\n echo scan \u003e /sys/kernel/debug/kmemleak\n cat /sys/kernel/debug/kmemleak\n unreferenced object 0xffff8881203c3f08 (size 8):\n comm \"ls\", pid 5060, jiffies 4307222943\n hex dump (first 8 bytes):\n 5a 45 4c 44 41 00 cc cc ZELDA...\n backtrace (crc d109a8cf):\n __kmalloc_node_track_caller_noprof+0x572/0x710\n kstrdup+0x3a/0x70\n cifs_sb_tlink+0x1209/0x1770 [cifs]\n cifs_get_fattr+0xe1/0xf50 [cifs]\n cifs_get_inode_info+0xb5/0x240 [cifs]\n cifs_revalidate_dentry_attr+0x2d1/0x470 [cifs]\n cifs_getattr+0x28e/0x450 [cifs]\n vfs_getattr_nosec+0x126/0x180\n vfs_statx+0xf6/0x220\n do_statx+0xab/0x110\n __x64_sys_statx+0xd5/0x130\n do_syscall_64+0xbb/0x380\n entry_SYSCALL_64_after_hwframe+0x77/0x7f",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68295",
"url": "https://www.suse.com/security/cve/CVE-2025-68295"
},
{
"category": "external",
"summary": "SUSE Bug 1255129 for CVE-2025-68295",
"url": "https://bugzilla.suse.com/1255129"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2025-68295"
},
{
"cve": "CVE-2025-68374",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68374"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmd: fix rcu protection in md_wakeup_thread\n\nWe attempted to use RCU to protect the pointer \u0027thread\u0027, but directly\npassed the value when calling md_wakeup_thread(). This means that the\nRCU pointer has been acquired before rcu_read_lock(), which renders\nrcu_read_lock() ineffective and could lead to a use-after-free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68374",
"url": "https://www.suse.com/security/cve/CVE-2025-68374"
},
{
"category": "external",
"summary": "SUSE Bug 1255530 for CVE-2025-68374",
"url": "https://bugzilla.suse.com/1255530"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2025-68374"
},
{
"cve": "CVE-2025-68736",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68736"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nlandlock: Fix handling of disconnected directories\n\nDisconnected files or directories can appear when they are visible and\nopened from a bind mount, but have been renamed or moved from the source\nof the bind mount in a way that makes them inaccessible from the mount\npoint (i.e. out of scope).\n\nPreviously, access rights tied to files or directories opened through a\ndisconnected directory were collected by walking the related hierarchy\ndown to the root of the filesystem, without taking into account the\nmount point because it couldn\u0027t be found. This could lead to\ninconsistent access results, potential access right widening, and\nhard-to-debug renames, especially since such paths cannot be printed.\n\nFor a sandboxed task to create a disconnected directory, it needs to\nhave write access (i.e. FS_MAKE_REG, FS_REMOVE_FILE, and FS_REFER) to\nthe underlying source of the bind mount, and read access to the related\nmount point. Because a sandboxed task cannot acquire more access\nrights than those defined by its Landlock domain, this could lead to\ninconsistent access rights due to missing permissions that should be\ninherited from the mount point hierarchy, while inheriting permissions\nfrom the filesystem hierarchy hidden by this mount point instead.\n\nLandlock now handles files and directories opened from disconnected\ndirectories by taking into account the filesystem hierarchy when the\nmount point is not found in the hierarchy walk, and also always taking\ninto account the mount point from which these disconnected directories\nwere opened. This ensures that a rename is not allowed if it would\nwiden access rights [1].\n\nThe rationale is that, even if disconnected hierarchies might not be\nvisible or accessible to a sandboxed task, relying on the collected\naccess rights from them improves the guarantee that access rights will\nnot be widened during a rename because of the access right comparison\nbetween the source and the destination (see LANDLOCK_ACCESS_FS_REFER).\nIt may look like this would grant more access on disconnected files and\ndirectories, but the security policies are always enforced for all the\nevaluated hierarchies. This new behavior should be less surprising to\nusers and safer from an access control perspective.\n\nRemove a wrong WARN_ON_ONCE() canary in collect_domain_accesses() and\nfix the related comment.\n\nBecause opened files have their access rights stored in the related file\nsecurity properties, there is no impact for disconnected or unlinked\nfiles.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68736",
"url": "https://www.suse.com/security/cve/CVE-2025-68736"
},
{
"category": "external",
"summary": "SUSE Bug 1255698 for CVE-2025-68736",
"url": "https://bugzilla.suse.com/1255698"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2025-68736"
},
{
"cve": "CVE-2025-68778",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68778"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: don\u0027t log conflicting inode if it\u0027s a dir moved in the current transaction\n\nWe can\u0027t log a conflicting inode if it\u0027s a directory and it was moved\nfrom one parent directory to another parent directory in the current\ntransaction, as this can result an attempt to have a directory with\ntwo hard links during log replay, one for the old parent directory and\nanother for the new parent directory.\n\nThe following scenario triggers that issue:\n\n1) We have directories \"dir1\" and \"dir2\" created in a past transaction.\n Directory \"dir1\" has inode A as its parent directory;\n\n2) We move \"dir1\" to some other directory;\n\n3) We create a file with the name \"dir1\" in directory inode A;\n\n4) We fsync the new file. This results in logging the inode of the new file\n and the inode for the directory \"dir1\" that was previously moved in the\n current transaction. So the log tree has the INODE_REF item for the\n new location of \"dir1\";\n\n5) We move the new file to some other directory. This results in updating\n the log tree to included the new INODE_REF for the new location of the\n file and removes the INODE_REF for the old location. This happens\n during the rename when we call btrfs_log_new_name();\n\n6) We fsync the file, and that persists the log tree changes done in the\n previous step (btrfs_log_new_name() only updates the log tree in\n memory);\n\n7) We have a power failure;\n\n8) Next time the fs is mounted, log replay happens and when processing\n the inode for directory \"dir1\" we find a new INODE_REF and add that\n link, but we don\u0027t remove the old link of the inode since we have\n not logged the old parent directory of the directory inode \"dir1\".\n\nAs a result after log replay finishes when we trigger writeback of the\nsubvolume tree\u0027s extent buffers, the tree check will detect that we have\na directory a hard link count of 2 and we get a mount failure.\nThe errors and stack traces reported in dmesg/syslog are like this:\n\n [ 3845.729764] BTRFS info (device dm-0): start tree-log replay\n [ 3845.730304] page: refcount:3 mapcount:0 mapping:000000005c8a3027 index:0x1d00 pfn:0x11510c\n [ 3845.731236] memcg:ffff9264c02f4e00\n [ 3845.731751] aops:btree_aops [btrfs] ino:1\n [ 3845.732300] flags: 0x17fffc00000400a(uptodate|private|writeback|node=0|zone=2|lastcpupid=0x1ffff)\n [ 3845.733346] raw: 017fffc00000400a 0000000000000000 dead000000000122 ffff9264d978aea8\n [ 3845.734265] raw: 0000000000001d00 ffff92650e6d4738 00000003ffffffff ffff9264c02f4e00\n [ 3845.735305] page dumped because: eb page dump\n [ 3845.735981] BTRFS critical (device dm-0): corrupt leaf: root=5 block=30408704 slot=6 ino=257, invalid nlink: has 2 expect no more than 1 for dir\n [ 3845.737786] BTRFS info (device dm-0): leaf 30408704 gen 10 total ptrs 17 free space 14881 owner 5\n [ 3845.737789] BTRFS info (device dm-0): refs 4 lock_owner 0 current 30701\n [ 3845.737792] \titem 0 key (256 INODE_ITEM 0) itemoff 16123 itemsize 160\n [ 3845.737794] \t\tinode generation 3 transid 9 size 16 nbytes 16384\n [ 3845.737795] \t\tblock group 0 mode 40755 links 1 uid 0 gid 0\n [ 3845.737797] \t\trdev 0 sequence 2 flags 0x0\n [ 3845.737798] \t\tatime 1764259517.0\n [ 3845.737800] \t\tctime 1764259517.572889464\n [ 3845.737801] \t\tmtime 1764259517.572889464\n [ 3845.737802] \t\totime 1764259517.0\n [ 3845.737803] \titem 1 key (256 INODE_REF 256) itemoff 16111 itemsize 12\n [ 3845.737805] \t\tindex 0 name_len 2\n [ 3845.737807] \titem 2 key (256 DIR_ITEM 2363071922) itemoff 16077 itemsize 34\n [ 3845.737808] \t\tlocation key (257 1 0) type 2\n [ 3845.737810] \t\ttransid 9 data_len 0 name_len 4\n [ 3845.737811] \titem 3 key (256 DIR_ITEM 2676584006) itemoff 16043 itemsize 34\n [ 3845.737813] \t\tlocation key (258 1 0) type 2\n [ 3845.737814] \t\ttransid 9 data_len 0 name_len 4\n [ 3845.737815] \titem 4 key (256 DIR_INDEX 2) itemoff 16009 itemsize 34\n [ 3845.737816] \t\tlocation key (257 1 0) type 2\n [\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68778",
"url": "https://www.suse.com/security/cve/CVE-2025-68778"
},
{
"category": "external",
"summary": "SUSE Bug 1256683 for CVE-2025-68778",
"url": "https://bugzilla.suse.com/1256683"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2025-68778"
},
{
"cve": "CVE-2025-68785",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68785"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: openvswitch: fix middle attribute validation in push_nsh() action\n\nThe push_nsh() action structure looks like this:\n\n OVS_ACTION_ATTR_PUSH_NSH(OVS_KEY_ATTR_NSH(OVS_NSH_KEY_ATTR_BASE,...))\n\nThe outermost OVS_ACTION_ATTR_PUSH_NSH attribute is OK\u0027ed by the\nnla_for_each_nested() inside __ovs_nla_copy_actions(). The innermost\nOVS_NSH_KEY_ATTR_BASE/MD1/MD2 are OK\u0027ed by the nla_for_each_nested()\ninside nsh_key_put_from_nlattr(). But nothing checks if the attribute\nin the middle is OK. We don\u0027t even check that this attribute is the\nOVS_KEY_ATTR_NSH. We just do a double unwrap with a pair of nla_data()\ncalls - first time directly while calling validate_push_nsh() and the\nsecond time as part of the nla_for_each_nested() macro, which isn\u0027t\nsafe, potentially causing invalid memory access if the size of this\nattribute is incorrect. The failure may not be noticed during\nvalidation due to larger netlink buffer, but cause trouble later during\naction execution where the buffer is allocated exactly to the size:\n\n BUG: KASAN: slab-out-of-bounds in nsh_hdr_from_nlattr+0x1dd/0x6a0 [openvswitch]\n Read of size 184 at addr ffff88816459a634 by task a.out/22624\n\n CPU: 8 UID: 0 PID: 22624 6.18.0-rc7+ #115 PREEMPT(voluntary)\n Call Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x51/0x70\n print_address_description.constprop.0+0x2c/0x390\n kasan_report+0xdd/0x110\n kasan_check_range+0x35/0x1b0\n __asan_memcpy+0x20/0x60\n nsh_hdr_from_nlattr+0x1dd/0x6a0 [openvswitch]\n push_nsh+0x82/0x120 [openvswitch]\n do_execute_actions+0x1405/0x2840 [openvswitch]\n ovs_execute_actions+0xd5/0x3b0 [openvswitch]\n ovs_packet_cmd_execute+0x949/0xdb0 [openvswitch]\n genl_family_rcv_msg_doit+0x1d6/0x2b0\n genl_family_rcv_msg+0x336/0x580\n genl_rcv_msg+0x9f/0x130\n netlink_rcv_skb+0x11f/0x370\n genl_rcv+0x24/0x40\n netlink_unicast+0x73e/0xaa0\n netlink_sendmsg+0x744/0xbf0\n __sys_sendto+0x3d6/0x450\n do_syscall_64+0x79/0x2c0\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n \u003c/TASK\u003e\n\nLet\u0027s add some checks that the attribute is properly sized and it\u0027s\nthe only one attribute inside the action. Technically, there is no\nreal reason for OVS_KEY_ATTR_NSH to be there, as we know that we\u0027re\npushing an NSH header already, it just creates extra nesting, but\nthat\u0027s how uAPI works today. So, keeping as it is.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68785",
"url": "https://www.suse.com/security/cve/CVE-2025-68785"
},
{
"category": "external",
"summary": "SUSE Bug 1256640 for CVE-2025-68785",
"url": "https://bugzilla.suse.com/1256640"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2025-68785"
},
{
"cve": "CVE-2025-68810",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68810"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: Disallow toggling KVM_MEM_GUEST_MEMFD on an existing memslot\n\nReject attempts to disable KVM_MEM_GUEST_MEMFD on a memslot that was\ninitially created with a guest_memfd binding, as KVM doesn\u0027t support\ntoggling KVM_MEM_GUEST_MEMFD on existing memslots. KVM prevents enabling\nKVM_MEM_GUEST_MEMFD, but doesn\u0027t prevent clearing the flag.\n\nFailure to reject the new memslot results in a use-after-free due to KVM\nnot unbinding from the guest_memfd instance. Unbinding on a FLAGS_ONLY\nchange is easy enough, and can/will be done as a hardening measure (in\nanticipation of KVM supporting dirty logging on guest_memfd at some point),\nbut fixing the use-after-free would only address the immediate symptom.\n\n ==================================================================\n BUG: KASAN: slab-use-after-free in kvm_gmem_release+0x362/0x400 [kvm]\n Write of size 8 at addr ffff8881111ae908 by task repro/745\n\n CPU: 7 UID: 1000 PID: 745 Comm: repro Not tainted 6.18.0-rc6-115d5de2eef3-next-kasan #3 NONE\n Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015\n Call Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x51/0x60\n print_report+0xcb/0x5c0\n kasan_report+0xb4/0xe0\n kvm_gmem_release+0x362/0x400 [kvm]\n __fput+0x2fa/0x9d0\n task_work_run+0x12c/0x200\n do_exit+0x6ae/0x2100\n do_group_exit+0xa8/0x230\n __x64_sys_exit_group+0x3a/0x50\n x64_sys_call+0x737/0x740\n do_syscall_64+0x5b/0x900\n entry_SYSCALL_64_after_hwframe+0x4b/0x53\n RIP: 0033:0x7f581f2eac31\n \u003c/TASK\u003e\n\n Allocated by task 745 on cpu 6 at 9.746971s:\n kasan_save_stack+0x20/0x40\n kasan_save_track+0x13/0x50\n __kasan_kmalloc+0x77/0x90\n kvm_set_memory_region.part.0+0x652/0x1110 [kvm]\n kvm_vm_ioctl+0x14b0/0x3290 [kvm]\n __x64_sys_ioctl+0x129/0x1a0\n do_syscall_64+0x5b/0x900\n entry_SYSCALL_64_after_hwframe+0x4b/0x53\n\n Freed by task 745 on cpu 6 at 9.747467s:\n kasan_save_stack+0x20/0x40\n kasan_save_track+0x13/0x50\n __kasan_save_free_info+0x37/0x50\n __kasan_slab_free+0x3b/0x60\n kfree+0xf5/0x440\n kvm_set_memslot+0x3c2/0x1160 [kvm]\n kvm_set_memory_region.part.0+0x86a/0x1110 [kvm]\n kvm_vm_ioctl+0x14b0/0x3290 [kvm]\n __x64_sys_ioctl+0x129/0x1a0\n do_syscall_64+0x5b/0x900\n entry_SYSCALL_64_after_hwframe+0x4b/0x53",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68810",
"url": "https://www.suse.com/security/cve/CVE-2025-68810"
},
{
"category": "external",
"summary": "SUSE Bug 1256679 for CVE-2025-68810",
"url": "https://bugzilla.suse.com/1256679"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2025-68810"
},
{
"cve": "CVE-2025-71071",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71071"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\niommu/mediatek: fix use-after-free on probe deferral\n\nThe driver is dropping the references taken to the larb devices during\nprobe after successful lookup as well as on errors. This can\npotentially lead to a use-after-free in case a larb device has not yet\nbeen bound to its driver so that the iommu driver probe defers.\n\nFix this by keeping the references as expected while the iommu driver is\nbound.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71071",
"url": "https://www.suse.com/security/cve/CVE-2025-71071"
},
{
"category": "external",
"summary": "SUSE Bug 1256802 for CVE-2025-71071",
"url": "https://bugzilla.suse.com/1256802"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2025-71071"
},
{
"cve": "CVE-2025-71104",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71104"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: x86: Fix VM hard lockup after prolonged inactivity with periodic HV timer\n\nWhen advancing the target expiration for the guest\u0027s APIC timer in periodic\nmode, set the expiration to \"now\" if the target expiration is in the past\n(similar to what is done in update_target_expiration()). Blindly adding\nthe period to the previous target expiration can result in KVM generating\na practically unbounded number of hrtimer IRQs due to programming an\nexpired timer over and over. In extreme scenarios, e.g. if userspace\npauses/suspends a VM for an extended duration, this can even cause hard\nlockups in the host.\n\nCurrently, the bug only affects Intel CPUs when using the hypervisor timer\n(HV timer), a.k.a. the VMX preemption timer. Unlike the software timer,\na.k.a. hrtimer, which KVM keeps running even on exits to userspace, the\nHV timer only runs while the guest is active. As a result, if the vCPU\ndoes not run for an extended duration, there will be a huge gap between\nthe target expiration and the current time the vCPU resumes running.\nBecause the target expiration is incremented by only one period on each\ntimer expiration, this leads to a series of timer expirations occurring\nrapidly after the vCPU/VM resumes.\n\nMore critically, when the vCPU first triggers a periodic HV timer\nexpiration after resuming, advancing the expiration by only one period\nwill result in a target expiration in the past. As a result, the delta\nmay be calculated as a negative value. When the delta is converted into\nan absolute value (tscdeadline is an unsigned u64), the resulting value\ncan overflow what the HV timer is capable of programming. I.e. the large\nvalue will exceed the VMX Preemption Timer\u0027s maximum bit width of\ncpu_preemption_timer_multi + 32, and thus cause KVM to switch from the\nHV timer to the software timer (hrtimers).\n\nAfter switching to the software timer, periodic timer expiration callbacks\nmay be executed consecutively within a single clock interrupt handler,\nbecause hrtimers honors KVM\u0027s request for an expiration in the past and\nimmediately re-invokes KVM\u0027s callback after reprogramming. And because\nthe interrupt handler runs with IRQs disabled, restarting KVM\u0027s hrtimer\nover and over until the target expiration is advanced to \"now\" can result\nin a hard lockup.\n\nE.g. the following hard lockup was triggered in the host when running a\nWindows VM (only relevant because it used the APIC timer in periodic mode)\nafter resuming the VM from a long suspend (in the host).\n\n NMI watchdog: Watchdog detected hard LOCKUP on cpu 45\n ...\n RIP: 0010:advance_periodic_target_expiration+0x4d/0x80 [kvm]\n ...\n RSP: 0018:ff4f88f5d98d8ef0 EFLAGS: 00000046\n RAX: fff0103f91be678e RBX: fff0103f91be678e RCX: 00843a7d9e127bcc\n RDX: 0000000000000002 RSI: 0052ca4003697505 RDI: ff440d5bfbdbd500\n RBP: ff440d5956f99200 R08: ff2ff2a42deb6a84 R09: 000000000002a6c0\n R10: 0122d794016332b3 R11: 0000000000000000 R12: ff440db1af39cfc0\n R13: ff440db1af39cfc0 R14: ffffffffc0d4a560 R15: ff440db1af39d0f8\n FS: 00007f04a6ffd700(0000) GS:ff440db1af380000(0000) knlGS:000000e38a3b8000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 000000d5651feff8 CR3: 000000684e038002 CR4: 0000000000773ee0\n PKRU: 55555554\n Call Trace:\n \u003cIRQ\u003e\n apic_timer_fn+0x31/0x50 [kvm]\n __hrtimer_run_queues+0x100/0x280\n hrtimer_interrupt+0x100/0x210\n ? ttwu_do_wakeup+0x19/0x160\n smp_apic_timer_interrupt+0x6a/0x130\n apic_timer_interrupt+0xf/0x20\n \u003c/IRQ\u003e\n\nMoreover, if the suspend duration of the virtual machine is not long enough\nto trigger a hard lockup in this scenario, since commit 98c25ead5eda\n(\"KVM: VMX: Move preemption timer \u003c=\u003e hrtimer dance to common x86\"), KVM\nwill continue using the software timer until the guest reprograms the APIC\ntimer in some way. Since the periodic timer does not require frequent APIC\ntimer register programming, the guest may continue to use the software\ntimer in \n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71104",
"url": "https://www.suse.com/security/cve/CVE-2025-71104"
},
{
"category": "external",
"summary": "SUSE Bug 1256708 for CVE-2025-71104",
"url": "https://bugzilla.suse.com/1256708"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2025-71104"
},
{
"cve": "CVE-2025-71113",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71113"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: af_alg - zero initialize memory allocated via sock_kmalloc\n\nSeveral crypto user API contexts and requests allocated with\nsock_kmalloc() were left uninitialized, relying on callers to\nset fields explicitly. This resulted in the use of uninitialized\ndata in certain error paths or when new fields are added in the\nfuture.\n\nThe ACVP patches also contain two user-space interface files:\nalgif_kpp.c and algif_akcipher.c. These too rely on proper\ninitialization of their context structures.\n\nA particular issue has been observed with the newly added\n\u0027inflight\u0027 variable introduced in af_alg_ctx by commit:\n\n 67b164a871af (\"crypto: af_alg - Disallow multiple in-flight AIO requests\")\n\nBecause the context is not memset to zero after allocation,\nthe inflight variable has contained garbage values. As a result,\naf_alg_alloc_areq() has incorrectly returned -EBUSY randomly when\nthe garbage value was interpreted as true:\n\n https://github.com/gregkh/linux/blame/master/crypto/af_alg.c#L1209\n\nThe check directly tests ctx-\u003einflight without explicitly\ncomparing against true/false. Since inflight is only ever set to\ntrue or false later, an uninitialized value has triggered\n-EBUSY failures. Zero-initializing memory allocated with\nsock_kmalloc() ensures inflight and other fields start in a known\nstate, removing random issues caused by uninitialized data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71113",
"url": "https://www.suse.com/security/cve/CVE-2025-71113"
},
{
"category": "external",
"summary": "SUSE Bug 1256716 for CVE-2025-71113",
"url": "https://bugzilla.suse.com/1256716"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2025-71113"
},
{
"cve": "CVE-2025-71126",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71126"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmptcp: avoid deadlock on fallback while reinjecting\n\nJakub reported an MPTCP deadlock at fallback time:\n\n WARNING: possible recursive locking detected\n 6.18.0-rc7-virtme #1 Not tainted\n --------------------------------------------\n mptcp_connect/20858 is trying to acquire lock:\n ff1100001da18b60 (\u0026msk-\u003efallback_lock){+.-.}-{3:3}, at: __mptcp_try_fallback+0xd8/0x280\n\n but task is already holding lock:\n ff1100001da18b60 (\u0026msk-\u003efallback_lock){+.-.}-{3:3}, at: __mptcp_retrans+0x352/0xaa0\n\n other info that might help us debug this:\n Possible unsafe locking scenario:\n\n CPU0\n ----\n lock(\u0026msk-\u003efallback_lock);\n lock(\u0026msk-\u003efallback_lock);\n\n *** DEADLOCK ***\n\n May be due to missing lock nesting notation\n\n 3 locks held by mptcp_connect/20858:\n #0: ff1100001da18290 (sk_lock-AF_INET){+.+.}-{0:0}, at: mptcp_sendmsg+0x114/0x1bc0\n #1: ff1100001db40fd0 (k-sk_lock-AF_INET#2){+.+.}-{0:0}, at: __mptcp_retrans+0x2cb/0xaa0\n #2: ff1100001da18b60 (\u0026msk-\u003efallback_lock){+.-.}-{3:3}, at: __mptcp_retrans+0x352/0xaa0\n\n stack backtrace:\n CPU: 0 UID: 0 PID: 20858 Comm: mptcp_connect Not tainted 6.18.0-rc7-virtme #1 PREEMPT(full)\n Hardware name: Bochs, BIOS Bochs 01/01/2011\n Call Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x6f/0xa0\n print_deadlock_bug.cold+0xc0/0xcd\n validate_chain+0x2ff/0x5f0\n __lock_acquire+0x34c/0x740\n lock_acquire.part.0+0xbc/0x260\n _raw_spin_lock_bh+0x38/0x50\n __mptcp_try_fallback+0xd8/0x280\n mptcp_sendmsg_frag+0x16c2/0x3050\n __mptcp_retrans+0x421/0xaa0\n mptcp_release_cb+0x5aa/0xa70\n release_sock+0xab/0x1d0\n mptcp_sendmsg+0xd5b/0x1bc0\n sock_write_iter+0x281/0x4d0\n new_sync_write+0x3c5/0x6f0\n vfs_write+0x65e/0xbb0\n ksys_write+0x17e/0x200\n do_syscall_64+0xbb/0xfd0\n entry_SYSCALL_64_after_hwframe+0x4b/0x53\n RIP: 0033:0x7fa5627cbc5e\n Code: 4d 89 d8 e8 14 bd 00 00 4c 8b 5d f8 41 8b 93 08 03 00 00 59 5e 48 83 f8 fc 74 11 c9 c3 0f 1f 80 00 00 00 00 48 8b 45 10 0f 05 \u003cc9\u003e c3 83 e2 39 83 fa 08 75 e7 e8 13 ff ff ff 0f 1f 00 f3 0f 1e fa\n RSP: 002b:00007fff1fe14700 EFLAGS: 00000202 ORIG_RAX: 0000000000000001\n RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007fa5627cbc5e\n RDX: 0000000000001f9c RSI: 00007fff1fe16984 RDI: 0000000000000005\n RBP: 00007fff1fe14710 R08: 0000000000000000 R09: 0000000000000000\n R10: 0000000000000000 R11: 0000000000000202 R12: 00007fff1fe16920\n R13: 0000000000002000 R14: 0000000000001f9c R15: 0000000000001f9c\n\nThe packet scheduler could attempt a reinjection after receiving an\nMP_FAIL and before the infinite map has been transmitted, causing a\ndeadlock since MPTCP needs to do the reinjection atomically from WRT\nfallback.\n\nAddress the issue explicitly avoiding the reinjection in the critical\nscenario. Note that this is the only fallback critical section that\ncould potentially send packets and hit the double-lock.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71126",
"url": "https://www.suse.com/security/cve/CVE-2025-71126"
},
{
"category": "external",
"summary": "SUSE Bug 1256755 for CVE-2025-71126",
"url": "https://bugzilla.suse.com/1256755"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2025-71126"
},
{
"cve": "CVE-2025-71148",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71148"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/handshake: restore destructor on submit failure\n\nhandshake_req_submit() replaces sk-\u003esk_destruct but never restores it when\nsubmission fails before the request is hashed. handshake_sk_destruct() then\nreturns early and the original destructor never runs, leaking the socket.\nRestore sk_destruct on the error path.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71148",
"url": "https://www.suse.com/security/cve/CVE-2025-71148"
},
{
"category": "external",
"summary": "SUSE Bug 1257159 for CVE-2025-71148",
"url": "https://bugzilla.suse.com/1257159"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2025-71148"
},
{
"cve": "CVE-2025-71182",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71182"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: j1939: make j1939_session_activate() fail if device is no longer registered\n\nsyzbot is still reporting\n\n unregister_netdevice: waiting for vcan0 to become free. Usage count = 2\n\neven after commit 93a27b5891b8 (\"can: j1939: add missing calls in\nNETDEV_UNREGISTER notification handler\") was added. A debug printk() patch\nfound that j1939_session_activate() can succeed even after\nj1939_cancel_active_session() from j1939_netdev_notify(NETDEV_UNREGISTER)\nhas completed.\n\nSince j1939_cancel_active_session() is processed with the session list lock\nheld, checking ndev-\u003ereg_state in j1939_session_activate() with the session\nlist lock held can reliably close the race window.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71182",
"url": "https://www.suse.com/security/cve/CVE-2025-71182"
},
{
"category": "external",
"summary": "SUSE Bug 1257586 for CVE-2025-71182",
"url": "https://bugzilla.suse.com/1257586"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2025-71182"
},
{
"cve": "CVE-2025-71184",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71184"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix NULL dereference on root when tracing inode eviction\n\nWhen evicting an inode the first thing we do is to setup tracing for it,\nwhich implies fetching the root\u0027s id. But in btrfs_evict_inode() the\nroot might be NULL, as implied in the next check that we do in\nbtrfs_evict_inode().\n\nHence, we either should set the -\u003eroot_objectid to 0 in case the root is\nNULL, or we move tracing setup after checking that the root is not\nNULL. Setting the rootid to 0 at least gives us the possibility to trace\nthis call even in the case when the root is NULL, so that\u0027s the solution\ntaken here.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71184",
"url": "https://www.suse.com/security/cve/CVE-2025-71184"
},
{
"category": "external",
"summary": "SUSE Bug 1257635 for CVE-2025-71184",
"url": "https://bugzilla.suse.com/1257635"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2025-71184"
},
{
"cve": "CVE-2025-71185",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71185"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: ti: dma-crossbar: fix device leak on am335x route allocation\n\nMake sure to drop the reference taken when looking up the crossbar\nplatform device during am335x route allocation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71185",
"url": "https://www.suse.com/security/cve/CVE-2025-71185"
},
{
"category": "external",
"summary": "SUSE Bug 1257560 for CVE-2025-71185",
"url": "https://bugzilla.suse.com/1257560"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2025-71185"
},
{
"cve": "CVE-2025-71188",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71188"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: lpc18xx-dmamux: fix device leak on route allocation\n\nMake sure to drop the reference taken when looking up the DMA mux\nplatform device during route allocation.\n\nNote that holding a reference to a device does not prevent its driver\ndata from going away so there is no point in keeping the reference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71188",
"url": "https://www.suse.com/security/cve/CVE-2025-71188"
},
{
"category": "external",
"summary": "SUSE Bug 1257576 for CVE-2025-71188",
"url": "https://bugzilla.suse.com/1257576"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2025-71188"
},
{
"cve": "CVE-2025-71189",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71189"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: dw: dmamux: fix OF node leak on route allocation failure\n\nMake sure to drop the reference taken to the DMA master OF node also on\nlate route allocation failures.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71189",
"url": "https://www.suse.com/security/cve/CVE-2025-71189"
},
{
"category": "external",
"summary": "SUSE Bug 1257573 for CVE-2025-71189",
"url": "https://bugzilla.suse.com/1257573"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "low"
}
],
"title": "CVE-2025-71189"
},
{
"cve": "CVE-2025-71190",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71190"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: bcm-sba-raid: fix device leak on probe\n\nMake sure to drop the reference taken when looking up the mailbox device\nduring probe on probe failures and on driver unbind.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71190",
"url": "https://www.suse.com/security/cve/CVE-2025-71190"
},
{
"category": "external",
"summary": "SUSE Bug 1257580 for CVE-2025-71190",
"url": "https://bugzilla.suse.com/1257580"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "low"
}
],
"title": "CVE-2025-71190"
},
{
"cve": "CVE-2025-71191",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71191"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: at_hdmac: fix device leak on of_dma_xlate()\n\nMake sure to drop the reference taken when looking up the DMA platform\ndevice during of_dma_xlate() when releasing channel resources.\n\nNote that commit 3832b78b3ec2 (\"dmaengine: at_hdmac: add missing\nput_device() call in at_dma_xlate()\") fixed the leak in a couple of\nerror paths but the reference is still leaking on successful allocation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71191",
"url": "https://www.suse.com/security/cve/CVE-2025-71191"
},
{
"category": "external",
"summary": "SUSE Bug 1257579 for CVE-2025-71191",
"url": "https://bugzilla.suse.com/1257579"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "low"
}
],
"title": "CVE-2025-71191"
},
{
"cve": "CVE-2025-71192",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71192"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: ac97: fix a double free in snd_ac97_controller_register()\n\nIf ac97_add_adapter() fails, put_device() is the correct way to drop\nthe device reference. kfree() is not required.\nAdd kfree() if idr_alloc() fails and in ac97_adapter_release() to do\nthe cleanup.\n\nFound by code review.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71192",
"url": "https://www.suse.com/security/cve/CVE-2025-71192"
},
{
"category": "external",
"summary": "SUSE Bug 1257679 for CVE-2025-71192",
"url": "https://bugzilla.suse.com/1257679"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2025-71192"
},
{
"cve": "CVE-2025-71194",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71194"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix deadlock in wait_current_trans() due to ignored transaction type\n\nWhen wait_current_trans() is called during start_transaction(), it\ncurrently waits for a blocked transaction without considering whether\nthe given transaction type actually needs to wait for that particular\ntransaction state. The btrfs_blocked_trans_types[] array already defines\nwhich transaction types should wait for which transaction states, but\nthis check was missing in wait_current_trans().\n\nThis can lead to a deadlock scenario involving two transactions and\npending ordered extents:\n\n 1. Transaction A is in TRANS_STATE_COMMIT_DOING state\n\n 2. A worker processing an ordered extent calls start_transaction()\n with TRANS_JOIN\n\n 3. join_transaction() returns -EBUSY because Transaction A is in\n TRANS_STATE_COMMIT_DOING\n\n 4. Transaction A moves to TRANS_STATE_UNBLOCKED and completes\n\n 5. A new Transaction B is created (TRANS_STATE_RUNNING)\n\n 6. The ordered extent from step 2 is added to Transaction B\u0027s\n pending ordered extents\n\n 7. Transaction B immediately starts commit by another task and\n enters TRANS_STATE_COMMIT_START\n\n 8. The worker finally reaches wait_current_trans(), sees Transaction B\n in TRANS_STATE_COMMIT_START (a blocked state), and waits\n unconditionally\n\n 9. However, TRANS_JOIN should NOT wait for TRANS_STATE_COMMIT_START\n according to btrfs_blocked_trans_types[]\n\n 10. Transaction B is waiting for pending ordered extents to complete\n\n 11. Deadlock: Transaction B waits for ordered extent, ordered extent\n waits for Transaction B\n\nThis can be illustrated by the following call stacks:\n CPU0 CPU1\n btrfs_finish_ordered_io()\n start_transaction(TRANS_JOIN)\n join_transaction()\n # -EBUSY (Transaction A is\n # TRANS_STATE_COMMIT_DOING)\n # Transaction A completes\n # Transaction B created\n # ordered extent added to\n # Transaction B\u0027s pending list\n btrfs_commit_transaction()\n # Transaction B enters\n # TRANS_STATE_COMMIT_START\n # waiting for pending ordered\n # extents\n wait_current_trans()\n # waits for Transaction B\n # (should not wait!)\n\nTask bstore_kv_sync in btrfs_commit_transaction waiting for ordered\nextents:\n\n __schedule+0x2e7/0x8a0\n schedule+0x64/0xe0\n btrfs_commit_transaction+0xbf7/0xda0 [btrfs]\n btrfs_sync_file+0x342/0x4d0 [btrfs]\n __x64_sys_fdatasync+0x4b/0x80\n do_syscall_64+0x33/0x40\n entry_SYSCALL_64_after_hwframe+0x44/0xa9\n\nTask kworker in wait_current_trans waiting for transaction commit:\n\n Workqueue: btrfs-syno_nocow btrfs_work_helper [btrfs]\n __schedule+0x2e7/0x8a0\n schedule+0x64/0xe0\n wait_current_trans+0xb0/0x110 [btrfs]\n start_transaction+0x346/0x5b0 [btrfs]\n btrfs_finish_ordered_io.isra.0+0x49b/0x9c0 [btrfs]\n btrfs_work_helper+0xe8/0x350 [btrfs]\n process_one_work+0x1d3/0x3c0\n worker_thread+0x4d/0x3e0\n kthread+0x12d/0x150\n ret_from_fork+0x1f/0x30\n\nFix this by passing the transaction type to wait_current_trans() and\nchecking btrfs_blocked_trans_types[cur_trans-\u003estate] against the given\ntype before deciding to wait. This ensures that transaction types which\nare allowed to join during certain blocked states will not unnecessarily\nwait and cause deadlocks.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71194",
"url": "https://www.suse.com/security/cve/CVE-2025-71194"
},
{
"category": "external",
"summary": "SUSE Bug 1257687 for CVE-2025-71194",
"url": "https://bugzilla.suse.com/1257687"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2025-71194"
},
{
"cve": "CVE-2025-71195",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71195"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: xilinx: xdma: Fix regmap max_register\n\nThe max_register field is assigned the size of the register memory\nregion instead of the offset of the last register.\nThe result is that reading from the regmap via debugfs can cause\na segmentation fault:\n\ntail /sys/kernel/debug/regmap/xdma.1.auto/registers\nUnable to handle kernel paging request at virtual address ffff800082f70000\nMem abort info:\n ESR = 0x0000000096000007\n EC = 0x25: DABT (current EL), IL = 32 bits\n SET = 0, FnV = 0\n EA = 0, S1PTW = 0\n FSC = 0x07: level 3 translation fault\n[...]\nCall trace:\n regmap_mmio_read32le+0x10/0x30\n _regmap_bus_reg_read+0x74/0xc0\n _regmap_read+0x68/0x198\n regmap_read+0x54/0x88\n regmap_read_debugfs+0x140/0x380\n regmap_map_read_file+0x30/0x48\n full_proxy_read+0x68/0xc8\n vfs_read+0xcc/0x310\n ksys_read+0x7c/0x120\n __arm64_sys_read+0x24/0x40\n invoke_syscall.constprop.0+0x64/0x108\n do_el0_svc+0xb0/0xd8\n el0_svc+0x38/0x130\n el0t_64_sync_handler+0x120/0x138\n el0t_64_sync+0x194/0x198\nCode: aa1e03e9 d503201f f9400000 8b214000 (b9400000)\n---[ end trace 0000000000000000 ]---\nnote: tail[1217] exited with irqs disabled\nnote: tail[1217] exited with preempt_count 1\nSegmentation fault",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71195",
"url": "https://www.suse.com/security/cve/CVE-2025-71195"
},
{
"category": "external",
"summary": "SUSE Bug 1257704 for CVE-2025-71195",
"url": "https://bugzilla.suse.com/1257704"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2025-71195"
},
{
"cve": "CVE-2025-71196",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71196"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nphy: stm32-usphyc: Fix off by one in probe()\n\nThe \"index\" variable is used as an index into the usbphyc-\u003ephys[] array\nwhich has usbphyc-\u003enphys elements. So if it is equal to usbphyc-\u003enphys\nthen it is one element out of bounds. The \"index\" comes from the\ndevice tree so it\u0027s data that we trust and it\u0027s unlikely to be wrong,\nhowever it\u0027s obviously still worth fixing the bug. Change the \u003e to \u003e=.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71196",
"url": "https://www.suse.com/security/cve/CVE-2025-71196"
},
{
"category": "external",
"summary": "SUSE Bug 1257716 for CVE-2025-71196",
"url": "https://bugzilla.suse.com/1257716"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2025-71196"
},
{
"cve": "CVE-2025-71197",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71197"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nw1: therm: Fix off-by-one buffer overflow in alarms_store\n\nThe sysfs buffer passed to alarms_store() is allocated with \u0027size + 1\u0027\nbytes and a NUL terminator is appended. However, the \u0027size\u0027 argument\ndoes not account for this extra byte. The original code then allocated\n\u0027size\u0027 bytes and used strcpy() to copy \u0027buf\u0027, which always writes one\nbyte past the allocated buffer since strcpy() copies until the NUL\nterminator at index \u0027size\u0027.\n\nFix this by parsing the \u0027buf\u0027 parameter directly using simple_strtoll()\nwithout allocating any intermediate memory or string copying. This\nremoves the overflow while simplifying the code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71197",
"url": "https://www.suse.com/security/cve/CVE-2025-71197"
},
{
"category": "external",
"summary": "SUSE Bug 1257743 for CVE-2025-71197",
"url": "https://bugzilla.suse.com/1257743"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2025-71197"
},
{
"cve": "CVE-2025-71198",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71198"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\niio: imu: st_lsm6dsx: fix iio_chan_spec for sensors without event detection\n\nThe st_lsm6dsx_acc_channels array of struct iio_chan_spec has a non-NULL\nevent_spec field, indicating support for IIO events. However, event\ndetection is not supported for all sensors, and if userspace tries to\nconfigure accelerometer wakeup events on a sensor device that does not\nsupport them (e.g. LSM6DS0), st_lsm6dsx_write_event() dereferences a NULL\npointer when trying to write to the wakeup register.\nDefine an additional struct iio_chan_spec array whose members have a NULL\nevent_spec field, and use this array instead of st_lsm6dsx_acc_channels for\nsensors without event detection capability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71198",
"url": "https://www.suse.com/security/cve/CVE-2025-71198"
},
{
"category": "external",
"summary": "SUSE Bug 1257741 for CVE-2025-71198",
"url": "https://bugzilla.suse.com/1257741"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2025-71198"
},
{
"cve": "CVE-2025-71199",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71199"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\niio: adc: at91-sama5d2_adc: Fix potential use-after-free in sama5d2_adc driver\n\nat91_adc_interrupt can call at91_adc_touch_data_handler function\nto start the work by schedule_work(\u0026st-\u003etouch_st.workq).\n\nIf we remove the module which will call at91_adc_remove to\nmake cleanup, it will free indio_dev through iio_device_unregister but\nquite a bit later. While the work mentioned above will be used. The\nsequence of operations that may lead to a UAF bug is as follows:\n\nCPU0 CPU1\n\n | at91_adc_workq_handler\nat91_adc_remove |\niio_device_unregister(indio_dev) |\n//free indio_dev a bit later |\n | iio_push_to_buffers(indio_dev)\n | //use indio_dev\n\nFix it by ensuring that the work is canceled before proceeding with\nthe cleanup in at91_adc_remove.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71199",
"url": "https://www.suse.com/security/cve/CVE-2025-71199"
},
{
"category": "external",
"summary": "SUSE Bug 1257750 for CVE-2025-71199",
"url": "https://bugzilla.suse.com/1257750"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2025-71199"
},
{
"cve": "CVE-2025-71200",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71200"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmmc: sdhci-of-dwcmshc: Prevent illegal clock reduction in HS200/HS400 mode\n\nWhen operating in HS200 or HS400 timing modes, reducing the clock frequency\nbelow 52MHz will lead to link broken as the Rockchip DWC MSHC controller\nrequires maintaining a minimum clock of 52MHz in these modes.\n\nAdd a check to prevent illegal clock reduction through debugfs:\n\nroot@debian:/# echo 50000000 \u003e /sys/kernel/debug/mmc0/clock\nroot@debian:/# [ 30.090146] mmc0: running CQE recovery\nmmc0: cqhci: Failed to halt\nmmc0: cqhci: spurious TCN for tag 0\nWARNING: drivers/mmc/host/cqhci-core.c:797 at cqhci_irq+0x254/0x818, CPU#1: kworker/1:0H/24\nModules linked in:\nCPU: 1 UID: 0 PID: 24 Comm: kworker/1:0H Not tainted 6.19.0-rc1-00001-g09db0998649d-dirty #204 PREEMPT\nHardware name: Rockchip RK3588 EVB1 V10 Board (DT)\nWorkqueue: kblockd blk_mq_run_work_fn\npstate: 604000c9 (nZCv daIF +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\npc : cqhci_irq+0x254/0x818\nlr : cqhci_irq+0x254/0x818\n...",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71200",
"url": "https://www.suse.com/security/cve/CVE-2025-71200"
},
{
"category": "external",
"summary": "SUSE Bug 1258222 for CVE-2025-71200",
"url": "https://bugzilla.suse.com/1258222"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2025-71200"
},
{
"cve": "CVE-2025-71222",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71222"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: wlcore: ensure skb headroom before skb_push\n\nThis avoids occasional skb_under_panic Oops from wl1271_tx_work. In this case, headroom is\nless than needed (typically 110 - 94 = 16 bytes).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71222",
"url": "https://www.suse.com/security/cve/CVE-2025-71222"
},
{
"category": "external",
"summary": "SUSE Bug 1258279 for CVE-2025-71222",
"url": "https://bugzilla.suse.com/1258279"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2025-71222"
},
{
"cve": "CVE-2025-71224",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71224"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mac80211: ocb: skip rx_no_sta when interface is not joined\n\nieee80211_ocb_rx_no_sta() assumes a valid channel context, which is only\npresent after JOIN_OCB.\n\nRX may run before JOIN_OCB is executed, in which case the OCB interface\nis not operational. Skip RX peer handling when the interface is not\njoined to avoid warnings in the RX path.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71224",
"url": "https://www.suse.com/security/cve/CVE-2025-71224"
},
{
"category": "external",
"summary": "SUSE Bug 1258824 for CVE-2025-71224",
"url": "https://bugzilla.suse.com/1258824"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2025-71224"
},
{
"cve": "CVE-2025-71225",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71225"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmd: suspend array while updating raid_disks via sysfs\n\nIn raid1_reshape(), freeze_array() is called before modifying the r1bio\nmemory pool (conf-\u003er1bio_pool) and conf-\u003eraid_disks, and\nunfreeze_array() is called after the update is completed.\n\nHowever, freeze_array() only waits until nr_sync_pending and\n(nr_pending - nr_queued) of all buckets reaches zero. When an I/O error\noccurs, nr_queued is increased and the corresponding r1bio is queued to\neither retry_list or bio_end_io_list. As a result, freeze_array() may\nunblock before these r1bios are released.\n\nThis can lead to a situation where conf-\u003eraid_disks and the mempool have\nalready been updated while queued r1bios, allocated with the old\nraid_disks value, are later released. Consequently, free_r1bio() may\naccess memory out of bounds in put_all_bios() and release r1bios of the\nwrong size to the new mempool, potentially causing issues with the\nmempool as well.\n\nSince only normal I/O might increase nr_queued while an I/O error occurs,\nsuspending the array avoids this issue.\n\nNote: Updating raid_disks via ioctl SET_ARRAY_INFO already suspends\nthe array. Therefore, we suspend the array when updating raid_disks\nvia sysfs to avoid this issue too.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71225",
"url": "https://www.suse.com/security/cve/CVE-2025-71225"
},
{
"category": "external",
"summary": "SUSE Bug 1258411 for CVE-2025-71225",
"url": "https://bugzilla.suse.com/1258411"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2025-71225"
},
{
"cve": "CVE-2025-71229",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71229"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: rtw88: Fix alignment fault in rtw_core_enable_beacon()\n\nrtw_core_enable_beacon() reads 4 bytes from an address that is not a\nmultiple of 4. This results in a crash on some systems.\n\nDo 1 byte reads/writes instead.\n\nUnable to handle kernel paging request at virtual address ffff8000827e0522\nMem abort info:\n ESR = 0x0000000096000021\n EC = 0x25: DABT (current EL), IL = 32 bits\n SET = 0, FnV = 0\n EA = 0, S1PTW = 0\n FSC = 0x21: alignment fault\nData abort info:\n ISV = 0, ISS = 0x00000021, ISS2 = 0x00000000\n CM = 0, WnR = 0, TnD = 0, TagAccess = 0\n GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0\nswapper pgtable: 4k pages, 48-bit VAs, pgdp=0000000005492000\n[ffff8000827e0522] pgd=0000000000000000, p4d=10000001021d9403, pud=10000001021da403, pmd=100000011061c403, pte=00780000f3200f13\nInternal error: Oops: 0000000096000021 [#1] SMP\nModules linked in: [...] rtw88_8822ce rtw88_8822c rtw88_pci rtw88_core [...]\nCPU: 0 UID: 0 PID: 73 Comm: kworker/u32:2 Tainted: G W 6.17.9 #1-NixOS VOLUNTARY\nTainted: [W]=WARN\nHardware name: FriendlyElec NanoPC-T6 LTS (DT)\nWorkqueue: phy0 rtw_c2h_work [rtw88_core]\npstate: 60400009 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\npc : rtw_pci_read32+0x18/0x40 [rtw88_pci]\nlr : rtw_core_enable_beacon+0xe0/0x148 [rtw88_core]\nsp : ffff800080cc3ca0\nx29: ffff800080cc3ca0 x28: ffff0001031fc240 x27: ffff000102100828\nx26: ffffd2cb7c9b4088 x25: ffff0001031fc2c0 x24: ffff000112fdef00\nx23: ffff000112fdef18 x22: ffff000111c29970 x21: 0000000000000001\nx20: 0000000000000001 x19: ffff000111c22040 x18: 0000000000000000\nx17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000\nx14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000\nx11: 0000000000000000 x10: 0000000000000000 x9 : ffffd2cb6507c090\nx8 : 0000000000000000 x7 : 0000000000000000 x6 : 0000000000000000\nx5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000000\nx2 : 0000000000007f10 x1 : 0000000000000522 x0 : ffff8000827e0522\nCall trace:\n rtw_pci_read32+0x18/0x40 [rtw88_pci] (P)\n rtw_hw_scan_chan_switch+0x124/0x1a8 [rtw88_core]\n rtw_fw_c2h_cmd_handle+0x254/0x290 [rtw88_core]\n rtw_c2h_work+0x50/0x98 [rtw88_core]\n process_one_work+0x178/0x3f8\n worker_thread+0x208/0x418\n kthread+0x120/0x220\n ret_from_fork+0x10/0x20\nCode: d28fe202 8b020000 f9524400 8b214000 (b9400000)\n---[ end trace 0000000000000000 ]---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71229",
"url": "https://www.suse.com/security/cve/CVE-2025-71229"
},
{
"category": "external",
"summary": "SUSE Bug 1258415 for CVE-2025-71229",
"url": "https://bugzilla.suse.com/1258415"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2025-71229"
},
{
"cve": "CVE-2025-71231",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71231"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: iaa - Fix out-of-bounds index in find_empty_iaa_compression_mode\n\nThe local variable \u0027i\u0027 is initialized with -EINVAL, but the for loop\nimmediately overwrites it and -EINVAL is never returned.\n\nIf no empty compression mode can be found, the function would return the\nout-of-bounds index IAA_COMP_MODES_MAX, which would cause an invalid\narray access in add_iaa_compression_mode().\n\nFix both issues by returning either a valid index or -EINVAL.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71231",
"url": "https://www.suse.com/security/cve/CVE-2025-71231"
},
{
"category": "external",
"summary": "SUSE Bug 1258424 for CVE-2025-71231",
"url": "https://bugzilla.suse.com/1258424"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "important"
}
],
"title": "CVE-2025-71231"
},
{
"cve": "CVE-2025-71232",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71232"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla2xxx: Free sp in error path to fix system crash\n\nSystem crash seen during load/unload test in a loop,\n\n[61110.449331] qla2xxx [0000:27:00.0]-0042:0: Disabled MSI-X.\n[61110.467494] =============================================================================\n[61110.467498] BUG qla2xxx_srbs (Tainted: G OE -------- --- ): Objects remaining in qla2xxx_srbs on __kmem_cache_shutdown()\n[61110.467501] -----------------------------------------------------------------------------\n\n[61110.467502] Slab 0x000000000ffc8162 objects=51 used=1 fp=0x00000000e25d3d85 flags=0x57ffffc0010200(slab|head|node=1|zone=2|lastcpupid=0x1fffff)\n[61110.467509] CPU: 53 PID: 455206 Comm: rmmod Kdump: loaded Tainted: G OE -------- --- 5.14.0-284.11.1.el9_2.x86_64 #1\n[61110.467513] Hardware name: HPE ProLiant DL385 Gen10 Plus v2/ProLiant DL385 Gen10 Plus v2, BIOS A42 08/17/2023\n[61110.467515] Call Trace:\n[61110.467516] \u003cTASK\u003e\n[61110.467519] dump_stack_lvl+0x34/0x48\n[61110.467526] slab_err.cold+0x53/0x67\n[61110.467534] __kmem_cache_shutdown+0x16e/0x320\n[61110.467540] kmem_cache_destroy+0x51/0x160\n[61110.467544] qla2x00_module_exit+0x93/0x99 [qla2xxx]\n[61110.467607] ? __do_sys_delete_module.constprop.0+0x178/0x280\n[61110.467613] ? syscall_trace_enter.constprop.0+0x145/0x1d0\n[61110.467616] ? do_syscall_64+0x5c/0x90\n[61110.467619] ? exc_page_fault+0x62/0x150\n[61110.467622] ? entry_SYSCALL_64_after_hwframe+0x63/0xcd\n[61110.467626] \u003c/TASK\u003e\n[61110.467627] Disabling lock debugging due to kernel taint\n[61110.467635] Object 0x0000000026f7e6e6 @offset=16000\n[61110.467639] ------------[ cut here ]------------\n[61110.467639] kmem_cache_destroy qla2xxx_srbs: Slab cache still has objects when called from qla2x00_module_exit+0x93/0x99 [qla2xxx]\n[61110.467659] WARNING: CPU: 53 PID: 455206 at mm/slab_common.c:520 kmem_cache_destroy+0x14d/0x160\n[61110.467718] CPU: 53 PID: 455206 Comm: rmmod Kdump: loaded Tainted: G B OE -------- --- 5.14.0-284.11.1.el9_2.x86_64 #1\n[61110.467720] Hardware name: HPE ProLiant DL385 Gen10 Plus v2/ProLiant DL385 Gen10 Plus v2, BIOS A42 08/17/2023\n[61110.467721] RIP: 0010:kmem_cache_destroy+0x14d/0x160\n[61110.467724] Code: 99 7d 07 00 48 89 ef e8 e1 6a 07 00 eb b3 48 8b 55 60 48 8b 4c 24 20 48 c7 c6 70 fc 66 90 48 c7 c7 f8 ef a1 90 e8 e1 ed 7c 00 \u003c0f\u003e 0b eb 93 c3 cc cc cc cc 66 2e 0f 1f 84 00 00 00 00 00 55 48 89\n[61110.467725] RSP: 0018:ffffa304e489fe80 EFLAGS: 00010282\n[61110.467727] RAX: 0000000000000000 RBX: ffffffffc0d9a860 RCX: 0000000000000027\n[61110.467729] RDX: ffff8fd5ff9598a8 RSI: 0000000000000001 RDI: ffff8fd5ff9598a0\n[61110.467730] RBP: ffff8fb6aaf78700 R08: 0000000000000000 R09: 0000000100d863b7\n[61110.467731] R10: ffffa304e489fd20 R11: ffffffff913bef48 R12: 0000000040002000\n[61110.467731] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000\n[61110.467733] FS: 00007f64c89fb740(0000) GS:ffff8fd5ff940000(0000) knlGS:0000000000000000\n[61110.467734] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[61110.467735] CR2: 00007f0f02bfe000 CR3: 00000020ad6dc005 CR4: 0000000000770ee0\n[61110.467736] PKRU: 55555554\n[61110.467737] Call Trace:\n[61110.467738] \u003cTASK\u003e\n[61110.467739] qla2x00_module_exit+0x93/0x99 [qla2xxx]\n[61110.467755] ? __do_sys_delete_module.constprop.0+0x178/0x280\n\nFree sp in the error path to fix the crash.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71232",
"url": "https://www.suse.com/security/cve/CVE-2025-71232"
},
{
"category": "external",
"summary": "SUSE Bug 1258422 for CVE-2025-71232",
"url": "https://bugzilla.suse.com/1258422"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2025-71232"
},
{
"cve": "CVE-2025-71234",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71234"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: rtl8xxxu: fix slab-out-of-bounds in rtl8xxxu_sta_add\n\nThe driver does not set hw-\u003esta_data_size, which causes mac80211 to\nallocate insufficient space for driver private station data in\n__sta_info_alloc(). When rtl8xxxu_sta_add() accesses members of\nstruct rtl8xxxu_sta_info through sta-\u003edrv_priv, this results in a\nslab-out-of-bounds write.\n\nKASAN report on RISC-V (VisionFive 2) with RTL8192EU adapter:\n\n BUG: KASAN: slab-out-of-bounds in rtl8xxxu_sta_add+0x31c/0x346\n Write of size 8 at addr ffffffd6d3e9ae88 by task kworker/u16:0/12\n\nSet hw-\u003esta_data_size to sizeof(struct rtl8xxxu_sta_info) during\nprobe, similar to how hw-\u003evif_data_size is configured. This ensures\nmac80211 allocates sufficient space for the driver\u0027s per-station\nprivate data.\n\nTested on StarFive VisionFive 2 v1.2A board.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71234",
"url": "https://www.suse.com/security/cve/CVE-2025-71234"
},
{
"category": "external",
"summary": "SUSE Bug 1258419 for CVE-2025-71234",
"url": "https://bugzilla.suse.com/1258419"
},
{
"category": "external",
"summary": "SUSE Bug 1258420 for CVE-2025-71234",
"url": "https://bugzilla.suse.com/1258420"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "important"
}
],
"title": "CVE-2025-71234"
},
{
"cve": "CVE-2025-71235",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71235"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla2xxx: Delay module unload while fabric scan in progress\n\nSystem crash seen during load/unload test in a loop.\n\n[105954.384919] RBP: ffff914589838dc0 R08: 0000000000000000 R09: 0000000000000086\n[105954.384920] R10: 000000000000000f R11: ffffa31240904be5 R12: ffff914605f868e0\n[105954.384921] R13: ffff914605f86910 R14: 0000000000008010 R15: 00000000ddb7c000\n[105954.384923] FS: 0000000000000000(0000) GS:ffff9163fec40000(0000) knlGS:0000000000000000\n[105954.384925] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[105954.384926] CR2: 000055d31ce1d6a0 CR3: 0000000119f5e001 CR4: 0000000000770ee0\n[105954.384928] PKRU: 55555554\n[105954.384929] Call Trace:\n[105954.384931] \u003cIRQ\u003e\n[105954.384934] qla24xx_sp_unmap+0x1f3/0x2a0 [qla2xxx]\n[105954.384962] ? qla_async_scan_sp_done+0x114/0x1f0 [qla2xxx]\n[105954.384980] ? qla24xx_els_ct_entry+0x4de/0x760 [qla2xxx]\n[105954.384999] ? __wake_up_common+0x80/0x190\n[105954.385004] ? qla24xx_process_response_queue+0xc2/0xaa0 [qla2xxx]\n[105954.385023] ? qla24xx_msix_rsp_q+0x44/0xb0 [qla2xxx]\n[105954.385040] ? __handle_irq_event_percpu+0x3d/0x190\n[105954.385044] ? handle_irq_event+0x58/0xb0\n[105954.385046] ? handle_edge_irq+0x93/0x240\n[105954.385050] ? __common_interrupt+0x41/0xa0\n[105954.385055] ? common_interrupt+0x3e/0xa0\n[105954.385060] ? asm_common_interrupt+0x22/0x40\n\nThe root cause of this was that there was a free (dma_free_attrs) in the\ninterrupt context. There was a device discovery/fabric scan in\nprogress. A module unload was issued which set the UNLOADING flag. As\npart of the discovery, after receiving an interrupt a work queue was\nscheduled (which involved a work to be queued). Since the UNLOADING\nflag is set, the work item was not allocated and the mapped memory had\nto be freed. The free occurred in interrupt context leading to system\ncrash. Delay the driver unload until the fabric scan is complete to\navoid the crash.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71235",
"url": "https://www.suse.com/security/cve/CVE-2025-71235"
},
{
"category": "external",
"summary": "SUSE Bug 1258469 for CVE-2025-71235",
"url": "https://bugzilla.suse.com/1258469"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2025-71235"
},
{
"cve": "CVE-2025-71236",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71236"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla2xxx: Validate sp before freeing associated memory\n\nSystem crash with the following signature\n[154563.214890] nvme nvme2: NVME-FC{1}: controller connect complete\n[154564.169363] qla2xxx [0000:b0:00.1]-3002:2: nvme: Sched: Set ZIO exchange threshold to 3.\n[154564.169405] qla2xxx [0000:b0:00.1]-ffffff:2: SET ZIO Activity exchange threshold to 5.\n[154565.539974] qla2xxx [0000:b0:00.1]-5013:2: RSCN database changed - 0078 0080 0000.\n[154565.545744] qla2xxx [0000:b0:00.1]-5013:2: RSCN database changed - 0078 00a0 0000.\n[154565.545857] qla2xxx [0000:b0:00.1]-11a2:2: FEC=enabled (data rate).\n[154565.552760] qla2xxx [0000:b0:00.1]-11a2:2: FEC=enabled (data rate).\n[154565.553079] BUG: kernel NULL pointer dereference, address: 00000000000000f8\n[154565.553080] #PF: supervisor read access in kernel mode\n[154565.553082] #PF: error_code(0x0000) - not-present page\n[154565.553084] PGD 80000010488ab067 P4D 80000010488ab067 PUD 104978a067 PMD 0\n[154565.553089] Oops: 0000 1 PREEMPT SMP PTI\n[154565.553092] CPU: 10 PID: 858 Comm: qla2xxx_2_dpc Kdump: loaded Tainted: G OE ------- --- 5.14.0-503.11.1.el9_5.x86_64 #1\n[154565.553096] Hardware name: HPE Synergy 660 Gen10/Synergy 660 Gen10 Compute Module, BIOS I43 09/30/2024\n[154565.553097] RIP: 0010:qla_fab_async_scan.part.0+0x40b/0x870 [qla2xxx]\n[154565.553141] Code: 00 00 e8 58 a3 ec d4 49 89 e9 ba 12 20 00 00 4c 89 e6 49 c7 c0 00 ee a8 c0 48 c7 c1 66 c0 a9 c0 bf 00 80 00 10 e8 15 69 00 00 \u003c4c\u003e 8b 8d f8 00 00 00 4d 85 c9 74 35 49 8b 84 24 00 19 00 00 48 8b\n[154565.553143] RSP: 0018:ffffb4dbc8aebdd0 EFLAGS: 00010286\n[154565.553145] RAX: 0000000000000000 RBX: ffff8ec2cf0908d0 RCX: 0000000000000002\n[154565.553147] RDX: 0000000000000000 RSI: ffffffffc0a9c896 RDI: ffffb4dbc8aebd47\n[154565.553148] RBP: 0000000000000000 R08: ffffb4dbc8aebd45 R09: 0000000000ffff0a\n[154565.553150] R10: 0000000000000000 R11: 000000000000000f R12: ffff8ec2cf0908d0\n[154565.553151] R13: ffff8ec2cf090900 R14: 0000000000000102 R15: ffff8ec2cf084000\n[154565.553152] FS: 0000000000000000(0000) GS:ffff8ed27f800000(0000) knlGS:0000000000000000\n[154565.553154] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[154565.553155] CR2: 00000000000000f8 CR3: 000000113ae0a005 CR4: 00000000007706f0\n[154565.553157] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[154565.553158] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n[154565.553159] PKRU: 55555554\n[154565.553160] Call Trace:\n[154565.553162] \u003cTASK\u003e\n[154565.553165] ? show_trace_log_lvl+0x1c4/0x2df\n[154565.553172] ? show_trace_log_lvl+0x1c4/0x2df\n[154565.553177] ? qla_fab_async_scan.part.0+0x40b/0x870 [qla2xxx]\n[154565.553215] ? __die_body.cold+0x8/0xd\n[154565.553218] ? page_fault_oops+0x134/0x170\n[154565.553223] ? snprintf+0x49/0x70\n[154565.553229] ? exc_page_fault+0x62/0x150\n[154565.553238] ? asm_exc_page_fault+0x22/0x30\n\nCheck for sp being non NULL before freeing any associated memory",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71236",
"url": "https://www.suse.com/security/cve/CVE-2025-71236"
},
{
"category": "external",
"summary": "SUSE Bug 1258442 for CVE-2025-71236",
"url": "https://bugzilla.suse.com/1258442"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2025-71236"
},
{
"cve": "CVE-2026-22979",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-22979"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: fix memory leak in skb_segment_list for GRO packets\n\nWhen skb_segment_list() is called during packet forwarding, it handles\npackets that were aggregated by the GRO engine.\n\nHistorically, the segmentation logic in skb_segment_list assumes that\nindividual segments are split from a parent SKB and may need to carry\ntheir own socket memory accounting. Accordingly, the code transfers\ntruesize from the parent to the newly created segments.\n\nPrior to commit ed4cccef64c1 (\"gro: fix ownership transfer\"), this\ntruesize subtraction in skb_segment_list() was valid because fragments\nstill carry a reference to the original socket.\n\nHowever, commit ed4cccef64c1 (\"gro: fix ownership transfer\") changed\nthis behavior by ensuring that fraglist entries are explicitly\norphaned (skb-\u003esk = NULL) to prevent illegal orphaning later in the\nstack. This change meant that the entire socket memory charge remained\nwith the head SKB, but the corresponding accounting logic in\nskb_segment_list() was never updated.\n\nAs a result, the current code unconditionally adds each fragment\u0027s\ntruesize to delta_truesize and subtracts it from the parent SKB. Since\nthe fragments are no longer charged to the socket, this subtraction\nresults in an effective under-count of memory when the head is freed.\nThis causes sk_wmem_alloc to remain non-zero, preventing socket\ndestruction and leading to a persistent memory leak.\n\nThe leak can be observed via KMEMLEAK when tearing down the networking\nenvironment:\n\nunreferenced object 0xffff8881e6eb9100 (size 2048):\n comm \"ping\", pid 6720, jiffies 4295492526\n backtrace:\n kmem_cache_alloc_noprof+0x5c6/0x800\n sk_prot_alloc+0x5b/0x220\n sk_alloc+0x35/0xa00\n inet6_create.part.0+0x303/0x10d0\n __sock_create+0x248/0x640\n __sys_socket+0x11b/0x1d0\n\nSince skb_segment_list() is exclusively used for SKB_GSO_FRAGLIST\npackets constructed by GRO, the truesize adjustment is removed.\n\nThe call to skb_release_head_state() must be preserved. As documented in\ncommit cf673ed0e057 (\"net: fix fraglist segmentation reference count\nleak\"), it is still required to correctly drop references to SKB\nextensions that may be overwritten during __copy_skb_header().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-22979",
"url": "https://www.suse.com/security/cve/CVE-2026-22979"
},
{
"category": "external",
"summary": "SUSE Bug 1257228 for CVE-2026-22979",
"url": "https://bugzilla.suse.com/1257228"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2026-22979"
},
{
"cve": "CVE-2026-22982",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-22982"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: mscc: ocelot: Fix crash when adding interface under a lag\n\nCommit 15faa1f67ab4 (\"lan966x: Fix crash when adding interface under a lag\")\nfixed a similar issue in the lan966x driver caused by a NULL pointer dereference.\nThe ocelot_set_aggr_pgids() function in the ocelot driver has similar logic\nand is susceptible to the same crash.\n\nThis issue specifically affects the ocelot_vsc7514.c frontend, which leaves\nunused ports as NULL pointers. The felix_vsc9959.c frontend is unaffected as\nit uses the DSA framework which registers all ports.\n\nFix this by checking if the port pointer is valid before accessing it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-22982",
"url": "https://www.suse.com/security/cve/CVE-2026-22982"
},
{
"category": "external",
"summary": "SUSE Bug 1257179 for CVE-2026-22982",
"url": "https://bugzilla.suse.com/1257179"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2026-22982"
},
{
"cve": "CVE-2026-22998",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-22998"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvme-tcp: fix NULL pointer dereferences in nvmet_tcp_build_pdu_iovec\n\nCommit efa56305908b (\"nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length\")\nadded ttag bounds checking and data_offset\nvalidation in nvmet_tcp_handle_h2c_data_pdu(), but it did not validate\nwhether the command\u0027s data structures (cmd-\u003ereq.sg and cmd-\u003eiov) have\nbeen properly initialized before processing H2C_DATA PDUs.\n\nThe nvmet_tcp_build_pdu_iovec() function dereferences these pointers\nwithout NULL checks. This can be triggered by sending H2C_DATA PDU\nimmediately after the ICREQ/ICRESP handshake, before\nsending a CONNECT command or NVMe write command.\n\nAttack vectors that trigger NULL pointer dereferences:\n1. H2C_DATA PDU sent before CONNECT -\u003e both pointers NULL\n2. H2C_DATA PDU for READ command -\u003e cmd-\u003ereq.sg allocated, cmd-\u003eiov NULL\n3. H2C_DATA PDU for uninitialized command slot -\u003e both pointers NULL\n\nThe fix validates both cmd-\u003ereq.sg and cmd-\u003eiov before calling\nnvmet_tcp_build_pdu_iovec(). Both checks are required because:\n- Uninitialized commands: both NULL\n- READ commands: cmd-\u003ereq.sg allocated, cmd-\u003eiov NULL\n- WRITE commands: both allocated",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-22998",
"url": "https://www.suse.com/security/cve/CVE-2026-22998"
},
{
"category": "external",
"summary": "SUSE Bug 1257209 for CVE-2026-22998",
"url": "https://bugzilla.suse.com/1257209"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2026-22998"
},
{
"cve": "CVE-2026-23003",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23003"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nip6_tunnel: use skb_vlan_inet_prepare() in __ip6_tnl_rcv()\n\nBlamed commit did not take care of VLAN encapsulations\nas spotted by syzbot [1].\n\nUse skb_vlan_inet_prepare() instead of pskb_inet_may_pull().\n\n[1]\n BUG: KMSAN: uninit-value in __INET_ECN_decapsulate include/net/inet_ecn.h:253 [inline]\n BUG: KMSAN: uninit-value in INET_ECN_decapsulate include/net/inet_ecn.h:275 [inline]\n BUG: KMSAN: uninit-value in IP6_ECN_decapsulate+0x7a8/0x1fa0 include/net/inet_ecn.h:321\n __INET_ECN_decapsulate include/net/inet_ecn.h:253 [inline]\n INET_ECN_decapsulate include/net/inet_ecn.h:275 [inline]\n IP6_ECN_decapsulate+0x7a8/0x1fa0 include/net/inet_ecn.h:321\n ip6ip6_dscp_ecn_decapsulate+0x16f/0x1b0 net/ipv6/ip6_tunnel.c:729\n __ip6_tnl_rcv+0xed9/0x1b50 net/ipv6/ip6_tunnel.c:860\n ip6_tnl_rcv+0xc3/0x100 net/ipv6/ip6_tunnel.c:903\n gre_rcv+0x1529/0x1b90 net/ipv6/ip6_gre.c:-1\n ip6_protocol_deliver_rcu+0x1c89/0x2c60 net/ipv6/ip6_input.c:438\n ip6_input_finish+0x1f4/0x4a0 net/ipv6/ip6_input.c:489\n NF_HOOK include/linux/netfilter.h:318 [inline]\n ip6_input+0x9c/0x330 net/ipv6/ip6_input.c:500\n ip6_mc_input+0x7ca/0xc10 net/ipv6/ip6_input.c:590\n dst_input include/net/dst.h:474 [inline]\n ip6_rcv_finish+0x958/0x990 net/ipv6/ip6_input.c:79\n NF_HOOK include/linux/netfilter.h:318 [inline]\n ipv6_rcv+0xf1/0x3c0 net/ipv6/ip6_input.c:311\n __netif_receive_skb_one_core net/core/dev.c:6139 [inline]\n __netif_receive_skb+0x1df/0xac0 net/core/dev.c:6252\n netif_receive_skb_internal net/core/dev.c:6338 [inline]\n netif_receive_skb+0x57/0x630 net/core/dev.c:6397\n tun_rx_batched+0x1df/0x980 drivers/net/tun.c:1485\n tun_get_user+0x5c0e/0x6c60 drivers/net/tun.c:1953\n tun_chr_write_iter+0x3e9/0x5c0 drivers/net/tun.c:1999\n new_sync_write fs/read_write.c:593 [inline]\n vfs_write+0xbe2/0x15d0 fs/read_write.c:686\n ksys_write fs/read_write.c:738 [inline]\n __do_sys_write fs/read_write.c:749 [inline]\n __se_sys_write fs/read_write.c:746 [inline]\n __x64_sys_write+0x1fb/0x4d0 fs/read_write.c:746\n x64_sys_call+0x30ab/0x3e70 arch/x86/include/generated/asm/syscalls_64.h:2\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xd3/0xf80 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nUninit was created at:\n slab_post_alloc_hook mm/slub.c:4960 [inline]\n slab_alloc_node mm/slub.c:5263 [inline]\n kmem_cache_alloc_node_noprof+0x9e7/0x17a0 mm/slub.c:5315\n kmalloc_reserve+0x13c/0x4b0 net/core/skbuff.c:586\n __alloc_skb+0x805/0x1040 net/core/skbuff.c:690\n alloc_skb include/linux/skbuff.h:1383 [inline]\n alloc_skb_with_frags+0xc5/0xa60 net/core/skbuff.c:6712\n sock_alloc_send_pskb+0xacc/0xc60 net/core/sock.c:2995\n tun_alloc_skb drivers/net/tun.c:1461 [inline]\n tun_get_user+0x1142/0x6c60 drivers/net/tun.c:1794\n tun_chr_write_iter+0x3e9/0x5c0 drivers/net/tun.c:1999\n new_sync_write fs/read_write.c:593 [inline]\n vfs_write+0xbe2/0x15d0 fs/read_write.c:686\n ksys_write fs/read_write.c:738 [inline]\n __do_sys_write fs/read_write.c:749 [inline]\n __se_sys_write fs/read_write.c:746 [inline]\n __x64_sys_write+0x1fb/0x4d0 fs/read_write.c:746\n x64_sys_call+0x30ab/0x3e70 arch/x86/include/generated/asm/syscalls_64.h:2\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xd3/0xf80 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nCPU: 0 UID: 0 PID: 6465 Comm: syz.0.17 Not tainted syzkaller #0 PREEMPT(none)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23003",
"url": "https://www.suse.com/security/cve/CVE-2026-23003"
},
{
"category": "external",
"summary": "SUSE Bug 1257246 for CVE-2026-23003",
"url": "https://bugzilla.suse.com/1257246"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2026-23003"
},
{
"cve": "CVE-2026-23004",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23004"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndst: fix races in rt6_uncached_list_del() and rt_del_uncached_list()\n\nsyzbot was able to crash the kernel in rt6_uncached_list_flush_dev()\nin an interesting way [1]\n\nCrash happens in list_del_init()/INIT_LIST_HEAD() while writing\nlist-\u003eprev, while the prior write on list-\u003enext went well.\n\nstatic inline void INIT_LIST_HEAD(struct list_head *list)\n{\n\tWRITE_ONCE(list-\u003enext, list); // This went well\n\tWRITE_ONCE(list-\u003eprev, list); // Crash, @list has been freed.\n}\n\nIssue here is that rt6_uncached_list_del() did not attempt to lock\nul-\u003elock, as list_empty(\u0026rt-\u003edst.rt_uncached) returned\ntrue because the WRITE_ONCE(list-\u003enext, list) happened on the other CPU.\n\nWe might use list_del_init_careful() and list_empty_careful(),\nor make sure rt6_uncached_list_del() always grabs the spinlock\nwhenever rt-\u003edst.rt_uncached_list has been set.\n\nA similar fix is neeed for IPv4.\n\n[1]\n\n BUG: KASAN: slab-use-after-free in INIT_LIST_HEAD include/linux/list.h:46 [inline]\n BUG: KASAN: slab-use-after-free in list_del_init include/linux/list.h:296 [inline]\n BUG: KASAN: slab-use-after-free in rt6_uncached_list_flush_dev net/ipv6/route.c:191 [inline]\n BUG: KASAN: slab-use-after-free in rt6_disable_ip+0x633/0x730 net/ipv6/route.c:5020\nWrite of size 8 at addr ffff8880294cfa78 by task kworker/u8:14/3450\n\nCPU: 0 UID: 0 PID: 3450 Comm: kworker/u8:14 Tainted: G L syzkaller #0 PREEMPT_{RT,(full)}\nTainted: [L]=SOFTLOCKUP\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025\nWorkqueue: netns cleanup_net\nCall Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0xe8/0x150 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:378 [inline]\n print_report+0xca/0x240 mm/kasan/report.c:482\n kasan_report+0x118/0x150 mm/kasan/report.c:595\n INIT_LIST_HEAD include/linux/list.h:46 [inline]\n list_del_init include/linux/list.h:296 [inline]\n rt6_uncached_list_flush_dev net/ipv6/route.c:191 [inline]\n rt6_disable_ip+0x633/0x730 net/ipv6/route.c:5020\n addrconf_ifdown+0x143/0x18a0 net/ipv6/addrconf.c:3853\n addrconf_notify+0x1bc/0x1050 net/ipv6/addrconf.c:-1\n notifier_call_chain+0x19d/0x3a0 kernel/notifier.c:85\n call_netdevice_notifiers_extack net/core/dev.c:2268 [inline]\n call_netdevice_notifiers net/core/dev.c:2282 [inline]\n netif_close_many+0x29c/0x410 net/core/dev.c:1785\n unregister_netdevice_many_notify+0xb50/0x2330 net/core/dev.c:12353\n ops_exit_rtnl_list net/core/net_namespace.c:187 [inline]\n ops_undo_list+0x3dc/0x990 net/core/net_namespace.c:248\n cleanup_net+0x4de/0x7b0 net/core/net_namespace.c:696\n process_one_work kernel/workqueue.c:3257 [inline]\n process_scheduled_works+0xad1/0x1770 kernel/workqueue.c:3340\n worker_thread+0x8a0/0xda0 kernel/workqueue.c:3421\n kthread+0x711/0x8a0 kernel/kthread.c:463\n ret_from_fork+0x510/0xa50 arch/x86/kernel/process.c:158\n ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:246\n \u003c/TASK\u003e\n\nAllocated by task 803:\n kasan_save_stack mm/kasan/common.c:57 [inline]\n kasan_save_track+0x3e/0x80 mm/kasan/common.c:78\n unpoison_slab_object mm/kasan/common.c:340 [inline]\n __kasan_slab_alloc+0x6c/0x80 mm/kasan/common.c:366\n kasan_slab_alloc include/linux/kasan.h:253 [inline]\n slab_post_alloc_hook mm/slub.c:4953 [inline]\n slab_alloc_node mm/slub.c:5263 [inline]\n kmem_cache_alloc_noprof+0x18d/0x6c0 mm/slub.c:5270\n dst_alloc+0x105/0x170 net/core/dst.c:89\n ip6_dst_alloc net/ipv6/route.c:342 [inline]\n icmp6_dst_alloc+0x75/0x460 net/ipv6/route.c:3333\n mld_sendpack+0x683/0xe60 net/ipv6/mcast.c:1844\n mld_send_cr net/ipv6/mcast.c:2154 [inline]\n mld_ifc_work+0x83e/0xd60 net/ipv6/mcast.c:2693\n process_one_work kernel/workqueue.c:3257 [inline]\n process_scheduled_works+0xad1/0x1770 kernel/workqueue.c:3340\n worker_thread+0x8a0/0xda0 kernel/workqueue.c:3421\n kthread+0x711/0x8a0 kernel/kthread.c:463\n ret_from_fork+0x510/0xa50 arch/x86/kernel/process.c:158\n ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entr\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23004",
"url": "https://www.suse.com/security/cve/CVE-2026-23004"
},
{
"category": "external",
"summary": "SUSE Bug 1257231 for CVE-2026-23004",
"url": "https://bugzilla.suse.com/1257231"
},
{
"category": "external",
"summary": "SUSE Bug 1258655 for CVE-2026-23004",
"url": "https://bugzilla.suse.com/1258655"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "important"
}
],
"title": "CVE-2026-23004"
},
{
"cve": "CVE-2026-23017",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23017"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nidpf: fix error handling in the init_task on load\n\nIf the init_task fails during a driver load, we end up without vports and\nnetdevs, effectively failing the entire process. In that state a\nsubsequent reset will result in a crash as the service task attempts to\naccess uninitialized resources. Following trace is from an error in the\ninit_task where the CREATE_VPORT (op 501) is rejected by the FW:\n\n[40922.763136] idpf 0000:83:00.0: Device HW Reset initiated\n[40924.449797] idpf 0000:83:00.0: Transaction failed (op 501)\n[40958.148190] idpf 0000:83:00.0: HW reset detected\n[40958.161202] BUG: kernel NULL pointer dereference, address: 00000000000000a8\n...\n[40958.168094] Workqueue: idpf-0000:83:00.0-vc_event idpf_vc_event_task [idpf]\n[40958.168865] RIP: 0010:idpf_vc_event_task+0x9b/0x350 [idpf]\n...\n[40958.177932] Call Trace:\n[40958.178491] \u003cTASK\u003e\n[40958.179040] process_one_work+0x226/0x6d0\n[40958.179609] worker_thread+0x19e/0x340\n[40958.180158] ? __pfx_worker_thread+0x10/0x10\n[40958.180702] kthread+0x10f/0x250\n[40958.181238] ? __pfx_kthread+0x10/0x10\n[40958.181774] ret_from_fork+0x251/0x2b0\n[40958.182307] ? __pfx_kthread+0x10/0x10\n[40958.182834] ret_from_fork_asm+0x1a/0x30\n[40958.183370] \u003c/TASK\u003e\n\nFix the error handling in the init_task to make sure the service and\nmailbox tasks are disabled if the error happens during load. These are\nstarted in idpf_vc_core_init(), which spawns the init_task and has no way\nof knowing if it failed. If the error happens on reset, following\nsuccessful driver load, the tasks can still run, as that will allow the\nnetdevs to attempt recovery through another reset. Stop the PTP callbacks\neither way as those will be restarted by the call to idpf_vc_core_init()\nduring a successful reset.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23017",
"url": "https://www.suse.com/security/cve/CVE-2026-23017"
},
{
"category": "external",
"summary": "SUSE Bug 1257552 for CVE-2026-23017",
"url": "https://bugzilla.suse.com/1257552"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2026-23017"
},
{
"cve": "CVE-2026-23021",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23021"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: pegasus: fix memory leak in update_eth_regs_async()\n\nWhen asynchronously writing to the device registers and if usb_submit_urb()\nfail, the code fail to release allocated to this point resources.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23021",
"url": "https://www.suse.com/security/cve/CVE-2026-23021"
},
{
"category": "external",
"summary": "SUSE Bug 1257557 for CVE-2026-23021",
"url": "https://bugzilla.suse.com/1257557"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2026-23021"
},
{
"cve": "CVE-2026-23026",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23026"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: qcom: gpi: Fix memory leak in gpi_peripheral_config()\n\nFix a memory leak in gpi_peripheral_config() where the original memory\npointed to by gchan-\u003econfig could be lost if krealloc() fails.\n\nThe issue occurs when:\n1. gchan-\u003econfig points to previously allocated memory\n2. krealloc() fails and returns NULL\n3. The function directly assigns NULL to gchan-\u003econfig, losing the\n reference to the original memory\n4. The original memory becomes unreachable and cannot be freed\n\nFix this by using a temporary variable to hold the krealloc() result\nand only updating gchan-\u003econfig when the allocation succeeds.\n\nFound via static analysis and code review.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23026",
"url": "https://www.suse.com/security/cve/CVE-2026-23026"
},
{
"category": "external",
"summary": "SUSE Bug 1257562 for CVE-2026-23026",
"url": "https://bugzilla.suse.com/1257562"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2026-23026"
},
{
"cve": "CVE-2026-23033",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23033"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: omap-dma: fix dma_pool resource leak in error paths\n\nThe dma_pool created by dma_pool_create() is not destroyed when\ndma_async_device_register() or of_dma_controller_register() fails,\ncausing a resource leak in the probe error paths.\n\nAdd dma_pool_destroy() in both error paths to properly release the\nallocated dma_pool resource.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23033",
"url": "https://www.suse.com/security/cve/CVE-2026-23033"
},
{
"category": "external",
"summary": "SUSE Bug 1257570 for CVE-2026-23033",
"url": "https://bugzilla.suse.com/1257570"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "low"
}
],
"title": "CVE-2026-23033"
},
{
"cve": "CVE-2026-23035",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23035"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5e: Pass netdev to mlx5e_destroy_netdev instead of priv\n\nmlx5e_priv is an unstable structure that can be memset(0) if profile\nattaching fails.\n\nPass netdev to mlx5e_destroy_netdev() to guarantee it will work on a\nvalid netdev.\n\nOn mlx5e_remove: Check validity of priv-\u003eprofile, before attempting\nto cleanup any resources that might be not there.\n\nThis fixes a kernel oops in mlx5e_remove when switchdev mode fails due\nto change profile failure.\n\n$ devlink dev eswitch set pci/0000:00:03.0 mode switchdev\nError: mlx5_core: Failed setting eswitch to offloads.\ndmesg:\nworkqueue: Failed to create a rescuer kthread for wq \"mlx5e\": -EINTR\nmlx5_core 0012:03:00.1: mlx5e_netdev_init_profile:6214:(pid 37199): mlx5e_priv_init failed, err=-12\nmlx5_core 0012:03:00.1 gpu3rdma1: mlx5e_netdev_change_profile: new profile init failed, -12\nworkqueue: Failed to create a rescuer kthread for wq \"mlx5e\": -EINTR\nmlx5_core 0012:03:00.1: mlx5e_netdev_init_profile:6214:(pid 37199): mlx5e_priv_init failed, err=-12\nmlx5_core 0012:03:00.1 gpu3rdma1: mlx5e_netdev_change_profile: failed to rollback to orig profile, -12\n\n$ devlink dev reload pci/0000:00:03.0 ==\u003e oops\n\nBUG: kernel NULL pointer dereference, address: 0000000000000370\nPGD 0 P4D 0\nOops: Oops: 0000 [#1] SMP NOPTI\nCPU: 15 UID: 0 PID: 520 Comm: devlink Not tainted 6.18.0-rc5+ #115 PREEMPT(voluntary)\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-2.fc40 04/01/2014\nRIP: 0010:mlx5e_dcbnl_dscp_app+0x23/0x100\nRSP: 0018:ffffc9000083f8b8 EFLAGS: 00010286\nRAX: ffff8881126fc380 RBX: ffff8881015ac400 RCX: ffffffff826ffc45\nRDX: 0000000000000000 RSI: 0000000000000001 RDI: ffff8881035109c0\nRBP: ffff8881035109c0 R08: ffff888101e3e838 R09: ffff888100264e10\nR10: ffffc9000083f898 R11: ffffc9000083f8a0 R12: ffff888101b921a0\nR13: ffff888101b921a0 R14: ffff8881015ac9a0 R15: ffff8881015ac400\nFS: 00007f789a3c8740(0000) GS:ffff88856aa59000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000000000000370 CR3: 000000010b6c0001 CR4: 0000000000370ef0\nCall Trace:\n \u003cTASK\u003e\n mlx5e_remove+0x57/0x110\n device_release_driver_internal+0x19c/0x200\n bus_remove_device+0xc6/0x130\n device_del+0x160/0x3d0\n ? devl_param_driverinit_value_get+0x2d/0x90\n mlx5_detach_device+0x89/0xe0\n mlx5_unload_one_devl_locked+0x3a/0x70\n mlx5_devlink_reload_down+0xc8/0x220\n devlink_reload+0x7d/0x260\n devlink_nl_reload_doit+0x45b/0x5a0\n genl_family_rcv_msg_doit+0xe8/0x140",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23035",
"url": "https://www.suse.com/security/cve/CVE-2026-23035"
},
{
"category": "external",
"summary": "SUSE Bug 1257559 for CVE-2026-23035",
"url": "https://bugzilla.suse.com/1257559"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2026-23035"
},
{
"cve": "CVE-2026-23037",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23037"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: etas_es58x: allow partial RX URB allocation to succeed\n\nWhen es58x_alloc_rx_urbs() fails to allocate the requested number of\nURBs but succeeds in allocating some, it returns an error code.\nThis causes es58x_open() to return early, skipping the cleanup label\n\u0027free_urbs\u0027, which leads to the anchored URBs being leaked.\n\nAs pointed out by maintainer Vincent Mailhol, the driver is designed\nto handle partial URB allocation gracefully. Therefore, partial\nallocation should not be treated as a fatal error.\n\nModify es58x_alloc_rx_urbs() to return 0 if at least one URB has been\nallocated, restoring the intended behavior and preventing the leak\nin es58x_open().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23037",
"url": "https://www.suse.com/security/cve/CVE-2026-23037"
},
{
"category": "external",
"summary": "SUSE Bug 1257554 for CVE-2026-23037",
"url": "https://bugzilla.suse.com/1257554"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "low"
}
],
"title": "CVE-2026-23037"
},
{
"cve": "CVE-2026-23049",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23049"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/panel-simple: fix connector type for DataImage SCF0700C48GGU18 panel\n\nThe connector type for the DataImage SCF0700C48GGU18 panel is missing and\ndevm_drm_panel_bridge_add() requires connector type to be set. This leads\nto a warning and a backtrace in the kernel log and panel does not work:\n\"\nWARNING: CPU: 3 PID: 38 at drivers/gpu/drm/bridge/panel.c:379 devm_drm_of_get_bridge+0xac/0xb8\n\"\nThe warning is triggered by a check for valid connector type in\ndevm_drm_panel_bridge_add(). If there is no valid connector type\nset for a panel, the warning is printed and panel is not added.\nFill in the missing connector type to fix the warning and make\nthe panel operational once again.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23049",
"url": "https://www.suse.com/security/cve/CVE-2026-23049"
},
{
"category": "external",
"summary": "SUSE Bug 1257723 for CVE-2026-23049",
"url": "https://bugzilla.suse.com/1257723"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2026-23049"
},
{
"cve": "CVE-2026-23053",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23053"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFS: Fix a deadlock involving nfs_release_folio()\n\nWang Zhaolong reports a deadlock involving NFSv4.1 state recovery\nwaiting on kthreadd, which is attempting to reclaim memory by calling\nnfs_release_folio(). The latter cannot make progress due to state\nrecovery being needed.\n\nIt seems that the only safe thing to do here is to kick off a writeback\nof the folio, without waiting for completion, or else kicking off an\nasynchronous commit.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23053",
"url": "https://www.suse.com/security/cve/CVE-2026-23053"
},
{
"category": "external",
"summary": "SUSE Bug 1257718 for CVE-2026-23053",
"url": "https://bugzilla.suse.com/1257718"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2026-23053"
},
{
"cve": "CVE-2026-23056",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23056"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nuacce: implement mremap in uacce_vm_ops to return -EPERM\n\nThe current uacce_vm_ops does not support the mremap operation of\nvm_operations_struct. Implement .mremap to return -EPERM to remind\nusers.\n\nThe reason we need to explicitly disable mremap is that when the\ndriver does not implement .mremap, it uses the default mremap\nmethod. This could lead to a risk scenario:\n\nAn application might first mmap address p1, then mremap to p2,\nfollowed by munmap(p1), and finally munmap(p2). Since the default\nmremap copies the original vma\u0027s vm_private_data (i.e., q) to the\nnew vma, both munmap operations would trigger vma_close, causing\nq-\u003eqfr to be freed twice(qfr will be set to null here, so repeated\nrelease is ok).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23056",
"url": "https://www.suse.com/security/cve/CVE-2026-23056"
},
{
"category": "external",
"summary": "SUSE Bug 1257729 for CVE-2026-23056",
"url": "https://bugzilla.suse.com/1257729"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2026-23056"
},
{
"cve": "CVE-2026-23057",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23057"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvsock/virtio: Coalesce only linear skb\n\nvsock/virtio common tries to coalesce buffers in rx queue: if a linear skb\n(with a spare tail room) is followed by a small skb (length limited by\nGOOD_COPY_LEN = 128), an attempt is made to join them.\n\nSince the introduction of MSG_ZEROCOPY support, assumption that a small skb\nwill always be linear is incorrect. In the zerocopy case, data is lost and\nthe linear skb is appended with uninitialized kernel memory.\n\nOf all 3 supported virtio-based transports, only loopback-transport is\naffected. G2H virtio-transport rx queue operates on explicitly linear skbs;\nsee virtio_vsock_alloc_linear_skb() in virtio_vsock_rx_fill(). H2G\nvhost-transport may allocate non-linear skbs, but only for sizes that are\nnot considered for coalescence; see PAGE_ALLOC_COSTLY_ORDER in\nvirtio_vsock_alloc_skb().\n\nEnsure only linear skbs are coalesced. Note that skb_tailroom(last_skb) \u003e 0\nguarantees last_skb is linear.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23057",
"url": "https://www.suse.com/security/cve/CVE-2026-23057"
},
{
"category": "external",
"summary": "SUSE Bug 1257740 for CVE-2026-23057",
"url": "https://bugzilla.suse.com/1257740"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2026-23057"
},
{
"cve": "CVE-2026-23058",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23058"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: ems_usb: ems_usb_read_bulk_callback(): fix URB memory leak\n\nFix similar memory leak as in commit 7352e1d5932a (\"can: gs_usb:\ngs_usb_receive_bulk_callback(): fix URB memory leak\").\n\nIn ems_usb_open(), the URBs for USB-in transfers are allocated, added to\nthe dev-\u003erx_submitted anchor and submitted. In the complete callback\nems_usb_read_bulk_callback(), the URBs are processed and resubmitted. In\nems_usb_close() the URBs are freed by calling\nusb_kill_anchored_urbs(\u0026dev-\u003erx_submitted).\n\nHowever, this does not take into account that the USB framework unanchors\nthe URB before the complete function is called. This means that once an\nin-URB has been completed, it is no longer anchored and is ultimately not\nreleased in ems_usb_close().\n\nFix the memory leak by anchoring the URB in the\nems_usb_read_bulk_callback() to the dev-\u003erx_submitted anchor.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23058",
"url": "https://www.suse.com/security/cve/CVE-2026-23058"
},
{
"category": "external",
"summary": "SUSE Bug 1257739 for CVE-2026-23058",
"url": "https://bugzilla.suse.com/1257739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "low"
}
],
"title": "CVE-2026-23058"
},
{
"cve": "CVE-2026-23060",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23060"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: authencesn - reject too-short AAD (assoclen\u003c8) to match ESP/ESN spec\n\nauthencesn assumes an ESP/ESN-formatted AAD. When assoclen is shorter than\nthe minimum expected length, crypto_authenc_esn_decrypt() can advance past\nthe end of the destination scatterlist and trigger a NULL pointer dereference\nin scatterwalk_map_and_copy(), leading to a kernel panic (DoS).\n\nAdd a minimum AAD length check to fail fast on invalid inputs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23060",
"url": "https://www.suse.com/security/cve/CVE-2026-23060"
},
{
"category": "external",
"summary": "SUSE Bug 1257735 for CVE-2026-23060",
"url": "https://bugzilla.suse.com/1257735"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2026-23060"
},
{
"cve": "CVE-2026-23061",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23061"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: kvaser_usb: kvaser_usb_read_bulk_callback(): fix URB memory leak\n\nFix similar memory leak as in commit 7352e1d5932a (\"can: gs_usb:\ngs_usb_receive_bulk_callback(): fix URB memory leak\").\n\nIn kvaser_usb_set_{,data_}bittiming() -\u003e kvaser_usb_setup_rx_urbs(), the\nURBs for USB-in transfers are allocated, added to the dev-\u003erx_submitted\nanchor and submitted. In the complete callback\nkvaser_usb_read_bulk_callback(), the URBs are processed and resubmitted. In\nkvaser_usb_remove_interfaces() the URBs are freed by calling\nusb_kill_anchored_urbs(\u0026dev-\u003erx_submitted).\n\nHowever, this does not take into account that the USB framework unanchors\nthe URB before the complete function is called. This means that once an\nin-URB has been completed, it is no longer anchored and is ultimately not\nreleased in usb_kill_anchored_urbs().\n\nFix the memory leak by anchoring the URB in the\nkvaser_usb_read_bulk_callback() to the dev-\u003erx_submitted anchor.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23061",
"url": "https://www.suse.com/security/cve/CVE-2026-23061"
},
{
"category": "external",
"summary": "SUSE Bug 1257776 for CVE-2026-23061",
"url": "https://bugzilla.suse.com/1257776"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2026-23061"
},
{
"cve": "CVE-2026-23063",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23063"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nuacce: ensure safe queue release with state management\n\nDirectly calling `put_queue` carries risks since it cannot\nguarantee that resources of `uacce_queue` have been fully released\nbeforehand. So adding a `stop_queue` operation for the\nUACCE_CMD_PUT_Q command and leaving the `put_queue` operation to\nthe final resource release ensures safety.\n\nQueue states are defined as follows:\n- UACCE_Q_ZOMBIE: Initial state\n- UACCE_Q_INIT: After opening `uacce`\n- UACCE_Q_STARTED: After `start` is issued via `ioctl`\n\nWhen executing `poweroff -f` in virt while accelerator are still\nworking, `uacce_fops_release` and `uacce_remove` may execute\nconcurrently. This can cause `uacce_put_queue` within\n`uacce_fops_release` to access a NULL `ops` pointer. Therefore, add\nstate checks to prevent accessing freed pointers.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23063",
"url": "https://www.suse.com/security/cve/CVE-2026-23063"
},
{
"category": "external",
"summary": "SUSE Bug 1257722 for CVE-2026-23063",
"url": "https://bugzilla.suse.com/1257722"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2026-23063"
},
{
"cve": "CVE-2026-23064",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23064"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: act_ife: avoid possible NULL deref\n\ntcf_ife_encode() must make sure ife_encode() does not return NULL.\n\nsyzbot reported:\n\nOops: general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] SMP KASAN NOPTI\nKASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]\n RIP: 0010:ife_tlv_meta_encode+0x41/0xa0 net/ife/ife.c:166\nCPU: 3 UID: 0 PID: 8990 Comm: syz.0.696 Not tainted syzkaller #0 PREEMPT(full)\nCall Trace:\n \u003cTASK\u003e\n ife_encode_meta_u32+0x153/0x180 net/sched/act_ife.c:101\n tcf_ife_encode net/sched/act_ife.c:841 [inline]\n tcf_ife_act+0x1022/0x1de0 net/sched/act_ife.c:877\n tc_act include/net/tc_wrapper.h:130 [inline]\n tcf_action_exec+0x1c0/0xa20 net/sched/act_api.c:1152\n tcf_exts_exec include/net/pkt_cls.h:349 [inline]\n mall_classify+0x1a0/0x2a0 net/sched/cls_matchall.c:42\n tc_classify include/net/tc_wrapper.h:197 [inline]\n __tcf_classify net/sched/cls_api.c:1764 [inline]\n tcf_classify+0x7f2/0x1380 net/sched/cls_api.c:1860\n multiq_classify net/sched/sch_multiq.c:39 [inline]\n multiq_enqueue+0xe0/0x510 net/sched/sch_multiq.c:66\n dev_qdisc_enqueue+0x45/0x250 net/core/dev.c:4147\n __dev_xmit_skb net/core/dev.c:4262 [inline]\n __dev_queue_xmit+0x2998/0x46c0 net/core/dev.c:4798",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23064",
"url": "https://www.suse.com/security/cve/CVE-2026-23064"
},
{
"category": "external",
"summary": "SUSE Bug 1257765 for CVE-2026-23064",
"url": "https://bugzilla.suse.com/1257765"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2026-23064"
},
{
"cve": "CVE-2026-23068",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23068"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nspi: spi-sprd-adi: Fix double free in probe error path\n\nThe driver currently uses spi_alloc_host() to allocate the controller\nbut registers it using devm_spi_register_controller().\n\nIf devm_register_restart_handler() fails, the code jumps to the\nput_ctlr label and calls spi_controller_put(). However, since the\ncontroller was registered via a devm function, the device core will\nautomatically call spi_controller_put() again when the probe fails.\nThis results in a double-free of the spi_controller structure.\n\nFix this by switching to devm_spi_alloc_host() and removing the\nmanual spi_controller_put() call.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23068",
"url": "https://www.suse.com/security/cve/CVE-2026-23068"
},
{
"category": "external",
"summary": "SUSE Bug 1257805 for CVE-2026-23068",
"url": "https://bugzilla.suse.com/1257805"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2026-23068"
},
{
"cve": "CVE-2026-23071",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23071"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nregmap: Fix race condition in hwspinlock irqsave routine\n\nPreviously, the address of the shared member \u0027\u0026map-\u003espinlock_flags\u0027 was\npassed directly to \u0027hwspin_lock_timeout_irqsave\u0027. This creates a race\ncondition where multiple contexts contending for the lock could overwrite\nthe shared flags variable, potentially corrupting the state for the\ncurrent lock owner.\n\nFix this by using a local stack variable \u0027flags\u0027 to store the IRQ state\ntemporarily.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23071",
"url": "https://www.suse.com/security/cve/CVE-2026-23071"
},
{
"category": "external",
"summary": "SUSE Bug 1257706 for CVE-2026-23071",
"url": "https://bugzilla.suse.com/1257706"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2026-23071"
},
{
"cve": "CVE-2026-23073",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23073"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: rsi: Fix memory corruption due to not set vif driver data size\n\nThe struct ieee80211_vif contains trailing space for vif driver data,\nwhen struct ieee80211_vif is allocated, the total memory size that is\nallocated is sizeof(struct ieee80211_vif) + size of vif driver data.\nThe size of vif driver data is set by each WiFi driver as needed.\n\nThe RSI911x driver does not set vif driver data size, no trailing space\nfor vif driver data is therefore allocated past struct ieee80211_vif .\nThe RSI911x driver does however use the vif driver data to store its\nvif driver data structure \"struct vif_priv\". An access to vif-\u003edrv_priv\nleads to access out of struct ieee80211_vif bounds and corruption of\nsome memory.\n\nIn case of the failure observed locally, rsi_mac80211_add_interface()\nwould write struct vif_priv *vif_info = (struct vif_priv *)vif-\u003edrv_priv;\nvif_info-\u003evap_id = vap_idx. This write corrupts struct fq_tin member\nstruct list_head new_flows . The flow = list_first_entry(head, struct\nfq_flow, flowchain); in fq_tin_reset() then reports non-NULL bogus\naddress, which when accessed causes a crash.\n\nThe trigger is very simple, boot the machine with init=/bin/sh , mount\ndevtmpfs, sysfs, procfs, and then do \"ip link set wlan0 up\", \"sleep 1\",\n\"ip link set wlan0 down\" and the crash occurs.\n\nFix this by setting the correct size of vif driver data, which is the\nsize of \"struct vif_priv\", so that memory is allocated and the driver\ncan store its driver data in it, instead of corrupting memory around\nit.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23073",
"url": "https://www.suse.com/security/cve/CVE-2026-23073"
},
{
"category": "external",
"summary": "SUSE Bug 1257707 for CVE-2026-23073",
"url": "https://bugzilla.suse.com/1257707"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2026-23073"
},
{
"cve": "CVE-2026-23074",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23074"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: Enforce that teql can only be used as root qdisc\n\nDesign intent of teql is that it is only supposed to be used as root qdisc.\nWe need to check for that constraint.\n\nAlthough not important, I will describe the scenario that unearthed this\nissue for the curious.\n\nGangMin Kim \u003ckm.kim1503@gmail.com\u003e managed to concot a scenario as follows:\n\nROOT qdisc 1:0 (QFQ)\n \u251c\u2500\u2500 class 1:1 (weight=15, lmax=16384) netem with delay 6.4s\n \u2500\u2500 class 1:2 (weight=1, lmax=1514) teql\n\nGangMin sends a packet which is enqueued to 1:1 (netem).\nAny invocation of dequeue by QFQ from this class will not return a packet\nuntil after 6.4s. In the meantime, a second packet is sent and it lands on\n1:2. teql\u0027s enqueue will return success and this will activate class 1:2.\nMain issue is that teql only updates the parent visible qlen (sch-\u003eq.qlen)\nat dequeue. Since QFQ will only call dequeue if peek succeeds (and teql\u0027s\npeek always returns NULL), dequeue will never be called and thus the qlen\nwill remain as 0. With that in mind, when GangMin updates 1:2\u0027s lmax value,\nthe qfq_change_class calls qfq_deact_rm_from_agg. Since the child qdisc\u0027s\nqlen was not incremented, qfq fails to deactivate the class, but still\nfrees its pointers from the aggregate. So when the first packet is\nrescheduled after 6.4 seconds (netem\u0027s delay), a dangling pointer is\naccessed causing GangMin\u0027s causing a UAF.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23074",
"url": "https://www.suse.com/security/cve/CVE-2026-23074"
},
{
"category": "external",
"summary": "SUSE Bug 1257749 for CVE-2026-23074",
"url": "https://bugzilla.suse.com/1257749"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "important"
}
],
"title": "CVE-2026-23074"
},
{
"cve": "CVE-2026-23076",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23076"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: ctxfi: Fix potential OOB access in audio mixer handling\n\nIn the audio mixer handling code of ctxfi driver, the conf field is\nused as a kind of loop index, and it\u0027s referred in the index callbacks\n(amixer_index() and sum_index()).\n\nAs spotted recently by fuzzers, the current code causes OOB access at\nthose functions.\n| UBSAN: array-index-out-of-bounds in /build/reproducible-path/linux-6.17.8/sound/pci/ctxfi/ctamixer.c:347:48\n| index 8 is out of range for type \u0027unsigned char [8]\u0027\n\nAfter the analysis, the cause was found to be the lack of the proper\n(re-)initialization of conj field.\n\nThis patch addresses those OOB accesses by adding the proper\ninitializations of the loop indices.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23076",
"url": "https://www.suse.com/security/cve/CVE-2026-23076"
},
{
"category": "external",
"summary": "SUSE Bug 1257788 for CVE-2026-23076",
"url": "https://bugzilla.suse.com/1257788"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2026-23076"
},
{
"cve": "CVE-2026-23078",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23078"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: scarlett2: Fix buffer overflow in config retrieval\n\nThe scarlett2_usb_get_config() function has a logic error in the\nendianness conversion code that can cause buffer overflows when\ncount \u003e 1.\n\nThe code checks `if (size == 2)` where `size` is the total buffer size in\nbytes, then loops `count` times treating each element as u16 (2 bytes).\nThis causes the loop to access `count * 2` bytes when the buffer only\nhas `size` bytes allocated.\n\nFix by checking the element size (config_item-\u003esize) instead of the\ntotal buffer size. This ensures the endianness conversion matches the\nactual element type.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23078",
"url": "https://www.suse.com/security/cve/CVE-2026-23078"
},
{
"category": "external",
"summary": "SUSE Bug 1257789 for CVE-2026-23078",
"url": "https://bugzilla.suse.com/1257789"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2026-23078"
},
{
"cve": "CVE-2026-23080",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23080"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: mcba_usb: mcba_usb_read_bulk_callback(): fix URB memory leak\n\nFix similar memory leak as in commit 7352e1d5932a (\"can: gs_usb:\ngs_usb_receive_bulk_callback(): fix URB memory leak\").\n\nIn mcba_usb_probe() -\u003e mcba_usb_start(), the URBs for USB-in transfers are\nallocated, added to the priv-\u003erx_submitted anchor and submitted. In the\ncomplete callback mcba_usb_read_bulk_callback(), the URBs are processed and\nresubmitted. In mcba_usb_close() -\u003e mcba_urb_unlink() the URBs are freed by\ncalling usb_kill_anchored_urbs(\u0026priv-\u003erx_submitted).\n\nHowever, this does not take into account that the USB framework unanchors\nthe URB before the complete function is called. This means that once an\nin-URB has been completed, it is no longer anchored and is ultimately not\nreleased in usb_kill_anchored_urbs().\n\nFix the memory leak by anchoring the URB in the\nmcba_usb_read_bulk_callback()to the priv-\u003erx_submitted anchor.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23080",
"url": "https://www.suse.com/security/cve/CVE-2026-23080"
},
{
"category": "external",
"summary": "SUSE Bug 1257714 for CVE-2026-23080",
"url": "https://bugzilla.suse.com/1257714"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2026-23080"
},
{
"cve": "CVE-2026-23082",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23082"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: gs_usb: gs_usb_receive_bulk_callback(): unanchor URL on usb_submit_urb() error\n\nIn commit 7352e1d5932a (\"can: gs_usb: gs_usb_receive_bulk_callback(): fix\nURB memory leak\"), the URB was re-anchored before usb_submit_urb() in\ngs_usb_receive_bulk_callback() to prevent a leak of this URB during\ncleanup.\n\nHowever, this patch did not take into account that usb_submit_urb() could\nfail. The URB remains anchored and\nusb_kill_anchored_urbs(\u0026parent-\u003erx_submitted) in gs_can_close() loops\ninfinitely since the anchor list never becomes empty.\n\nTo fix the bug, unanchor the URB when an usb_submit_urb() error occurs,\nalso print an info message.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23082",
"url": "https://www.suse.com/security/cve/CVE-2026-23082"
},
{
"category": "external",
"summary": "SUSE Bug 1257715 for CVE-2026-23082",
"url": "https://bugzilla.suse.com/1257715"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2026-23082"
},
{
"cve": "CVE-2026-23083",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23083"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfou: Don\u0027t allow 0 for FOU_ATTR_IPPROTO.\n\nfou_udp_recv() has the same problem mentioned in the previous\npatch.\n\nIf FOU_ATTR_IPPROTO is set to 0, skb is not freed by\nfou_udp_recv() nor \"resubmit\"-ted in ip_protocol_deliver_rcu().\n\nLet\u0027s forbid 0 for FOU_ATTR_IPPROTO.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23083",
"url": "https://www.suse.com/security/cve/CVE-2026-23083"
},
{
"category": "external",
"summary": "SUSE Bug 1257745 for CVE-2026-23083",
"url": "https://bugzilla.suse.com/1257745"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "low"
}
],
"title": "CVE-2026-23083"
},
{
"cve": "CVE-2026-23084",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23084"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbe2net: Fix NULL pointer dereference in be_cmd_get_mac_from_list\n\nWhen the parameter pmac_id_valid argument of be_cmd_get_mac_from_list() is\nset to false, the driver may request the PMAC_ID from the firmware of the\nnetwork card, and this function will store that PMAC_ID at the provided\naddress pmac_id. This is the contract of this function.\n\nHowever, there is a location within the driver where both\npmac_id_valid == false and pmac_id == NULL are being passed. This could\nresult in dereferencing a NULL pointer.\n\nTo resolve this issue, it is necessary to pass the address of a stub\nvariable to the function.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23084",
"url": "https://www.suse.com/security/cve/CVE-2026-23084"
},
{
"category": "external",
"summary": "SUSE Bug 1257830 for CVE-2026-23084",
"url": "https://bugzilla.suse.com/1257830"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2026-23084"
},
{
"cve": "CVE-2026-23085",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23085"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nirqchip/gic-v3-its: Avoid truncating memory addresses\n\nOn 32-bit machines with CONFIG_ARM_LPAE, it is possible for lowmem\nallocations to be backed by addresses physical memory above the 32-bit\naddress limit, as found while experimenting with larger VMSPLIT\nconfigurations.\n\nThis caused the qemu virt model to crash in the GICv3 driver, which\nallocates the \u0027itt\u0027 object using GFP_KERNEL. Since all memory below\nthe 4GB physical address limit is in ZONE_DMA in this configuration,\nkmalloc() defaults to higher addresses for ZONE_NORMAL, and the\nITS driver stores the physical address in a 32-bit \u0027unsigned long\u0027\nvariable.\n\nChange the itt_addr variable to the correct phys_addr_t type instead,\nalong with all other variables in this driver that hold a physical\naddress.\n\nThe gicv5 driver correctly uses u64 variables, while all other irqchip\ndrivers don\u0027t call virt_to_phys or similar interfaces. It\u0027s expected that\nother device drivers have similar issues, but fixing this one is\nsufficient for booting a virtio based guest.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23085",
"url": "https://www.suse.com/security/cve/CVE-2026-23085"
},
{
"category": "external",
"summary": "SUSE Bug 1257758 for CVE-2026-23085",
"url": "https://bugzilla.suse.com/1257758"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2026-23085"
},
{
"cve": "CVE-2026-23086",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23086"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvsock/virtio: cap TX credit to local buffer size\n\nThe virtio transports derives its TX credit directly from peer_buf_alloc,\nwhich is set from the remote endpoint\u0027s SO_VM_SOCKETS_BUFFER_SIZE value.\n\nOn the host side this means that the amount of data we are willing to\nqueue for a connection is scaled by a guest-chosen buffer size, rather\nthan the host\u0027s own vsock configuration. A malicious guest can advertise\na large buffer and read slowly, causing the host to allocate a\ncorrespondingly large amount of sk_buff memory.\nThe same thing would happen in the guest with a malicious host, since\nvirtio transports share the same code base.\n\nIntroduce a small helper, virtio_transport_tx_buf_size(), that\nreturns min(peer_buf_alloc, buf_alloc), and use it wherever we consume\npeer_buf_alloc.\n\nThis ensures the effective TX window is bounded by both the peer\u0027s\nadvertised buffer and our own buf_alloc (already clamped to\nbuffer_max_size via SO_VM_SOCKETS_BUFFER_MAX_SIZE), so a remote peer\ncannot force the other to queue more data than allowed by its own\nvsock settings.\n\nOn an unpatched Ubuntu 22.04 host (~64 GiB RAM), running a PoC with\n32 guest vsock connections advertising 2 GiB each and reading slowly\ndrove Slab/SUnreclaim from ~0.5 GiB to ~57 GiB; the system only\nrecovered after killing the QEMU process. That said, if QEMU memory is\nlimited with cgroups, the maximum memory used will be limited.\n\nWith this patch applied:\n\n Before:\n MemFree: ~61.6 GiB\n Slab: ~142 MiB\n SUnreclaim: ~117 MiB\n\n After 32 high-credit connections:\n MemFree: ~61.5 GiB\n Slab: ~178 MiB\n SUnreclaim: ~152 MiB\n\nOnly ~35 MiB increase in Slab/SUnreclaim, no host OOM, and the guest\nremains responsive.\n\nCompatibility with non-virtio transports:\n\n - VMCI uses the AF_VSOCK buffer knobs to size its queue pairs per\n socket based on the local vsk-\u003ebuffer_* values; the remote side\n cannot enlarge those queues beyond what the local endpoint\n configured.\n\n - Hyper-V\u0027s vsock transport uses fixed-size VMBus ring buffers and\n an MTU bound; there is no peer-controlled credit field comparable\n to peer_buf_alloc, and the remote endpoint cannot drive in-flight\n kernel memory above those ring sizes.\n\n - The loopback path reuses virtio_transport_common.c, so it\n naturally follows the same semantics as the virtio transport.\n\nThis change is limited to virtio_transport_common.c and thus affects\nvirtio-vsock, vhost-vsock, and loopback, bringing them in line with the\n\"remote window intersected with local policy\" behaviour that VMCI and\nHyper-V already effectively have.\n\n[Stefano: small adjustments after changing the previous patch]\n[Stefano: tweak the commit message]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23086",
"url": "https://www.suse.com/security/cve/CVE-2026-23086"
},
{
"category": "external",
"summary": "SUSE Bug 1257757 for CVE-2026-23086",
"url": "https://bugzilla.suse.com/1257757"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2026-23086"
},
{
"cve": "CVE-2026-23089",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23089"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: usb-audio: Fix use-after-free in snd_usb_mixer_free()\n\nWhen snd_usb_create_mixer() fails, snd_usb_mixer_free() frees\nmixer-\u003eid_elems but the controls already added to the card still\nreference the freed memory. Later when snd_card_register() runs,\nthe OSS mixer layer calls their callbacks and hits a use-after-free read.\n\nCall trace:\n get_ctl_value+0x63f/0x820 sound/usb/mixer.c:411\n get_min_max_with_quirks.isra.0+0x240/0x1f40 sound/usb/mixer.c:1241\n mixer_ctl_feature_info+0x26b/0x490 sound/usb/mixer.c:1381\n snd_mixer_oss_build_test+0x174/0x3a0 sound/core/oss/mixer_oss.c:887\n ...\n snd_card_register+0x4ed/0x6d0 sound/core/init.c:923\n usb_audio_probe+0x5ef/0x2a90 sound/usb/card.c:1025\n\nFix by calling snd_ctl_remove() for all mixer controls before freeing\nid_elems. We save the next pointer first because snd_ctl_remove()\nfrees the current element.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23089",
"url": "https://www.suse.com/security/cve/CVE-2026-23089"
},
{
"category": "external",
"summary": "SUSE Bug 1257790 for CVE-2026-23089",
"url": "https://bugzilla.suse.com/1257790"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2026-23089"
},
{
"cve": "CVE-2026-23090",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23090"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nslimbus: core: fix device reference leak on report present\n\nSlimbus devices can be allocated dynamically upon reception of\nreport-present messages.\n\nMake sure to drop the reference taken when looking up already registered\ndevices.\n\nNote that this requires taking an extra reference in case the device has\nnot yet been registered and has to be allocated.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23090",
"url": "https://www.suse.com/security/cve/CVE-2026-23090"
},
{
"category": "external",
"summary": "SUSE Bug 1257759 for CVE-2026-23090",
"url": "https://bugzilla.suse.com/1257759"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2026-23090"
},
{
"cve": "CVE-2026-23091",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23091"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nintel_th: fix device leak on output open()\n\nMake sure to drop the reference taken when looking up the th device\nduring output device open() on errors and on close().\n\nNote that a recent commit fixed the leak in a couple of open() error\npaths but not all of them, and the reference is still leaking on\nsuccessful open().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23091",
"url": "https://www.suse.com/security/cve/CVE-2026-23091"
},
{
"category": "external",
"summary": "SUSE Bug 1257813 for CVE-2026-23091",
"url": "https://bugzilla.suse.com/1257813"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2026-23091"
},
{
"cve": "CVE-2026-23094",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23094"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nuacce: fix isolate sysfs check condition\n\nuacce supports the device isolation feature. If the driver\nimplements the isolate_err_threshold_read and\nisolate_err_threshold_write callback functions, uacce will create\nsysfs files now. Users can read and configure the isolation policy\nthrough sysfs. Currently, sysfs files are created as long as either\nisolate_err_threshold_read or isolate_err_threshold_write callback\nfunctions are present.\n\nHowever, accessing a non-existent callback function may cause the\nsystem to crash. Therefore, intercept the creation of sysfs if\nneither read nor write exists; create sysfs if either is supported,\nbut intercept unsupported operations at the call site.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23094",
"url": "https://www.suse.com/security/cve/CVE-2026-23094"
},
{
"category": "external",
"summary": "SUSE Bug 1257811 for CVE-2026-23094",
"url": "https://bugzilla.suse.com/1257811"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2026-23094"
},
{
"cve": "CVE-2026-23095",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23095"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ngue: Fix skb memleak with inner IP protocol 0.\n\nsyzbot reported skb memleak below. [0]\n\nThe repro generated a GUE packet with its inner protocol 0.\n\ngue_udp_recv() returns -guehdr-\u003eproto_ctype for \"resubmit\"\nin ip_protocol_deliver_rcu(), but this only works with\nnon-zero protocol number.\n\nLet\u0027s drop such packets.\n\nNote that 0 is a valid number (IPv6 Hop-by-Hop Option).\n\nI think it is not practical to encap HOPOPT in GUE, so once\nsomeone starts to complain, we could pass down a resubmit\nflag pointer to distinguish two zeros from the upper layer:\n\n * no error\n * resubmit HOPOPT\n\n[0]\nBUG: memory leak\nunreferenced object 0xffff888109695a00 (size 240):\n comm \"syz.0.17\", pid 6088, jiffies 4294943096\n hex dump (first 32 bytes):\n 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n 00 40 c2 10 81 88 ff ff 00 00 00 00 00 00 00 00 .@..............\n backtrace (crc a84b336f):\n kmemleak_alloc_recursive include/linux/kmemleak.h:44 [inline]\n slab_post_alloc_hook mm/slub.c:4958 [inline]\n slab_alloc_node mm/slub.c:5263 [inline]\n kmem_cache_alloc_noprof+0x3b4/0x590 mm/slub.c:5270\n __build_skb+0x23/0x60 net/core/skbuff.c:474\n build_skb+0x20/0x190 net/core/skbuff.c:490\n __tun_build_skb drivers/net/tun.c:1541 [inline]\n tun_build_skb+0x4a1/0xa40 drivers/net/tun.c:1636\n tun_get_user+0xc12/0x2030 drivers/net/tun.c:1770\n tun_chr_write_iter+0x71/0x120 drivers/net/tun.c:1999\n new_sync_write fs/read_write.c:593 [inline]\n vfs_write+0x45d/0x710 fs/read_write.c:686\n ksys_write+0xa7/0x170 fs/read_write.c:738\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xa4/0xf80 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23095",
"url": "https://www.suse.com/security/cve/CVE-2026-23095"
},
{
"category": "external",
"summary": "SUSE Bug 1257808 for CVE-2026-23095",
"url": "https://bugzilla.suse.com/1257808"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2026-23095"
},
{
"cve": "CVE-2026-23096",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23096"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nuacce: fix cdev handling in the cleanup path\n\nWhen cdev_device_add fails, it internally releases the cdev memory,\nand if cdev_device_del is then executed, it will cause a hang error.\nTo fix it, we check the return value of cdev_device_add() and clear\nuacce-\u003ecdev to avoid calling cdev_device_del in the uacce_remove.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23096",
"url": "https://www.suse.com/security/cve/CVE-2026-23096"
},
{
"category": "external",
"summary": "SUSE Bug 1257809 for CVE-2026-23096",
"url": "https://bugzilla.suse.com/1257809"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2026-23096"
},
{
"cve": "CVE-2026-23099",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23099"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbonding: limit BOND_MODE_8023AD to Ethernet devices\n\nBOND_MODE_8023AD makes sense for ARPHRD_ETHER only.\n\nsyzbot reported:\n\n BUG: KASAN: global-out-of-bounds in __hw_addr_create net/core/dev_addr_lists.c:63 [inline]\n BUG: KASAN: global-out-of-bounds in __hw_addr_add_ex+0x25d/0x760 net/core/dev_addr_lists.c:118\nRead of size 16 at addr ffffffff8bf94040 by task syz.1.3580/19497\n\nCPU: 1 UID: 0 PID: 19497 Comm: syz.1.3580 Tainted: G L syzkaller #0 PREEMPT(full)\nTainted: [L]=SOFTLOCKUP\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025\nCall Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0xe8/0x150 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:378 [inline]\n print_report+0xca/0x240 mm/kasan/report.c:482\n kasan_report+0x118/0x150 mm/kasan/report.c:595\n check_region_inline mm/kasan/generic.c:-1 [inline]\n kasan_check_range+0x2b0/0x2c0 mm/kasan/generic.c:200\n __asan_memcpy+0x29/0x70 mm/kasan/shadow.c:105\n __hw_addr_create net/core/dev_addr_lists.c:63 [inline]\n __hw_addr_add_ex+0x25d/0x760 net/core/dev_addr_lists.c:118\n __dev_mc_add net/core/dev_addr_lists.c:868 [inline]\n dev_mc_add+0xa1/0x120 net/core/dev_addr_lists.c:886\n bond_enslave+0x2b8b/0x3ac0 drivers/net/bonding/bond_main.c:2180\n do_set_master+0x533/0x6d0 net/core/rtnetlink.c:2963\n do_setlink+0xcf0/0x41c0 net/core/rtnetlink.c:3165\n rtnl_changelink net/core/rtnetlink.c:3776 [inline]\n __rtnl_newlink net/core/rtnetlink.c:3935 [inline]\n rtnl_newlink+0x161c/0x1c90 net/core/rtnetlink.c:4072\n rtnetlink_rcv_msg+0x7cf/0xb70 net/core/rtnetlink.c:6958\n netlink_rcv_skb+0x208/0x470 net/netlink/af_netlink.c:2550\n netlink_unicast_kernel net/netlink/af_netlink.c:1318 [inline]\n netlink_unicast+0x82f/0x9e0 net/netlink/af_netlink.c:1344\n netlink_sendmsg+0x805/0xb30 net/netlink/af_netlink.c:1894\n sock_sendmsg_nosec net/socket.c:727 [inline]\n __sock_sendmsg+0x21c/0x270 net/socket.c:742\n ____sys_sendmsg+0x505/0x820 net/socket.c:2592\n ___sys_sendmsg+0x21f/0x2a0 net/socket.c:2646\n __sys_sendmsg+0x164/0x220 net/socket.c:2678\n do_syscall_32_irqs_on arch/x86/entry/syscall_32.c:83 [inline]\n __do_fast_syscall_32+0x1dc/0x560 arch/x86/entry/syscall_32.c:307\n do_fast_syscall_32+0x34/0x80 arch/x86/entry/syscall_32.c:332\n entry_SYSENTER_compat_after_hwframe+0x84/0x8e\n \u003c/TASK\u003e\n\nThe buggy address belongs to the variable:\n lacpdu_mcast_addr+0x0/0x40",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23099",
"url": "https://www.suse.com/security/cve/CVE-2026-23099"
},
{
"category": "external",
"summary": "SUSE Bug 1257816 for CVE-2026-23099",
"url": "https://bugzilla.suse.com/1257816"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2026-23099"
},
{
"cve": "CVE-2026-23101",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23101"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nleds: led-class: Only Add LED to leds_list when it is fully ready\n\nBefore this change the LED was added to leds_list before led_init_core()\ngets called adding it the list before led_classdev.set_brightness_work gets\ninitialized.\n\nThis leaves a window where led_trigger_register() of a LED\u0027s default\ntrigger will call led_trigger_set() which calls led_set_brightness()\nwhich in turn will end up queueing the *uninitialized*\nled_classdev.set_brightness_work.\n\nThis race gets hit by the lenovo-thinkpad-t14s EC driver which registers\n2 LEDs with a default trigger provided by snd_ctl_led.ko in quick\nsuccession. The first led_classdev_register() causes an async modprobe of\nsnd_ctl_led to run and that async modprobe manages to exactly hit\nthe window where the second LED is on the leds_list without led_init_core()\nbeing called for it, resulting in:\n\n ------------[ cut here ]------------\n WARNING: CPU: 11 PID: 5608 at kernel/workqueue.c:4234 __flush_work+0x344/0x390\n Hardware name: LENOVO 21N2S01F0B/21N2S01F0B, BIOS N42ET93W (2.23 ) 09/01/2025\n ...\n Call trace:\n __flush_work+0x344/0x390 (P)\n flush_work+0x2c/0x50\n led_trigger_set+0x1c8/0x340\n led_trigger_register+0x17c/0x1c0\n led_trigger_register_simple+0x84/0xe8\n snd_ctl_led_init+0x40/0xf88 [snd_ctl_led]\n do_one_initcall+0x5c/0x318\n do_init_module+0x9c/0x2b8\n load_module+0x7e0/0x998\n\nClose the race window by moving the adding of the LED to leds_list to\nafter the led_init_core() call.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23101",
"url": "https://www.suse.com/security/cve/CVE-2026-23101"
},
{
"category": "external",
"summary": "SUSE Bug 1257768 for CVE-2026-23101",
"url": "https://bugzilla.suse.com/1257768"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2026-23101"
},
{
"cve": "CVE-2026-23102",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23102"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\narm64/fpsimd: signal: Fix restoration of SVE context\n\nWhen SME is supported, Restoring SVE signal context can go wrong in a\nfew ways, including placing the task into an invalid state where the\nkernel may read from out-of-bounds memory (and may potentially take a\nfatal fault) and/or may kill the task with a SIGKILL.\n\n(1) Restoring a context with SVE_SIG_FLAG_SM set can place the task into\n an invalid state where SVCR.SM is set (and sve_state is non-NULL)\n but TIF_SME is clear, consequently resuting in out-of-bounds memory\n reads and/or killing the task with SIGKILL.\n\n This can only occur in unusual (but legitimate) cases where the SVE\n signal context has either been modified by userspace or was saved in\n the context of another task (e.g. as with CRIU), as otherwise the\n presence of an SVE signal context with SVE_SIG_FLAG_SM implies that\n TIF_SME is already set.\n\n While in this state, task_fpsimd_load() will NOT configure SMCR_ELx\n (leaving some arbitrary value configured in hardware) before\n restoring SVCR and attempting to restore the streaming mode SVE\n registers from memory via sve_load_state(). As the value of\n SMCR_ELx.LEN may be larger than the task\u0027s streaming SVE vector\n length, this may read memory outside of the task\u0027s allocated\n sve_state, reading unrelated data and/or triggering a fault.\n\n While this can result in secrets being loaded into streaming SVE\n registers, these values are never exposed. As TIF_SME is clear,\n fpsimd_bind_task_to_cpu() will configure CPACR_ELx.SMEN to trap EL0\n accesses to streaming mode SVE registers, so these cannot be\n accessed directly at EL0. As fpsimd_save_user_state() verifies the\n live vector length before saving (S)SVE state to memory, no secret\n values can be saved back to memory (and hence cannot be observed via\n ptrace, signals, etc).\n\n When the live vector length doesn\u0027t match the expected vector length\n for the task, fpsimd_save_user_state() will send a fatal SIGKILL\n signal to the task. Hence the task may be killed after executing\n userspace for some period of time.\n\n(2) Restoring a context with SVE_SIG_FLAG_SM clear does not clear the\n task\u0027s SVCR.SM. If SVCR.SM was set prior to restoring the context,\n then the task will be left in streaming mode unexpectedly, and some\n register state will be combined inconsistently, though the task will\n be left in legitimate state from the kernel\u0027s PoV.\n\n This can only occur in unusual (but legitimate) cases where ptrace\n has been used to set SVCR.SM after entry to the sigreturn syscall,\n as syscall entry clears SVCR.SM.\n\n In these cases, the the provided SVE register data will be loaded\n into the task\u0027s sve_state using the non-streaming SVE vector length\n and the FPSIMD registers will be merged into this using the\n streaming SVE vector length.\n\nFix (1) by setting TIF_SME when setting SVCR.SM. This also requires\nensuring that the task\u0027s sme_state has been allocated, but as this could\ncontain live ZA state, it should not be zeroed. Fix (2) by clearing\nSVCR.SM when restoring a SVE signal context with SVE_SIG_FLAG_SM clear.\n\nFor consistency, I\u0027ve pulled the manipulation of SVCR, TIF_SVE, TIF_SME,\nand fp_type earlier, immediately after the allocation of\nsve_state/sme_state, before the restore of the actual register state.\nThis makes it easier to ensure that these are always modified\nconsistently, even if a fault is taken while reading the register data\nfrom the signal context. I do not expect any software to depend on the\nexact state restored when a fault is taken while reading the context.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23102",
"url": "https://www.suse.com/security/cve/CVE-2026-23102"
},
{
"category": "external",
"summary": "SUSE Bug 1257772 for CVE-2026-23102",
"url": "https://bugzilla.suse.com/1257772"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2026-23102"
},
{
"cve": "CVE-2026-23104",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23104"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nice: fix devlink reload call trace\n\nCommit 4da71a77fc3b (\"ice: read internal temperature sensor\") introduced\ninternal temperature sensor reading via HWMON. ice_hwmon_init() was added\nto ice_init_feature() and ice_hwmon_exit() was added to ice_remove(). As a\nresult if devlink reload is used to reinit the device and then the driver\nis removed, a call trace can occur.\n\nBUG: unable to handle page fault for address: ffffffffc0fd4b5d\nCall Trace:\n string+0x48/0xe0\n vsnprintf+0x1f9/0x650\n sprintf+0x62/0x80\n name_show+0x1f/0x30\n dev_attr_show+0x19/0x60\n\nThe call trace repeats approximately every 10 minutes when system\nmonitoring tools (e.g., sadc) attempt to read the orphaned hwmon sysfs\nattributes that reference freed module memory.\n\nThe sequence is:\n1. Driver load, ice_hwmon_init() gets called from ice_init_feature()\n2. Devlink reload down, flow does not call ice_remove()\n3. Devlink reload up, ice_hwmon_init() gets called from\n ice_init_feature() resulting in a second instance\n4. Driver unload, ice_hwmon_exit() called from ice_remove() leaving the\n first hwmon instance orphaned with dangling pointer\n\nFix this by moving ice_hwmon_exit() from ice_remove() to\nice_deinit_features() to ensure proper cleanup symmetry with\nice_hwmon_init().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23104",
"url": "https://www.suse.com/security/cve/CVE-2026-23104"
},
{
"category": "external",
"summary": "SUSE Bug 1257763 for CVE-2026-23104",
"url": "https://bugzilla.suse.com/1257763"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2026-23104"
},
{
"cve": "CVE-2026-23105",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23105"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: qfq: Use cl_is_active to determine whether class is active in qfq_rm_from_ag\n\nThis is more of a preventive patch to make the code more consistent and\nto prevent possible exploits that employ child qlen manipulations on qfq.\nuse cl_is_active instead of relying on the child qdisc\u0027s qlen to determine\nclass activation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23105",
"url": "https://www.suse.com/security/cve/CVE-2026-23105"
},
{
"category": "external",
"summary": "SUSE Bug 1257775 for CVE-2026-23105",
"url": "https://bugzilla.suse.com/1257775"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2026-23105"
},
{
"cve": "CVE-2026-23107",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23107"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\narm64/fpsimd: signal: Allocate SSVE storage when restoring ZA\n\nThe code to restore a ZA context doesn\u0027t attempt to allocate the task\u0027s\nsve_state before setting TIF_SME. Consequently, restoring a ZA context\ncan place a task into an invalid state where TIF_SME is set but the\ntask\u0027s sve_state is NULL.\n\nIn legitimate but uncommon cases where the ZA signal context was NOT\ncreated by the kernel in the context of the same task (e.g. if the task\nis saved/restored with something like CRIU), we have no guarantee that\nsve_state had been allocated previously. In these cases, userspace can\nenter streaming mode without trapping while sve_state is NULL, causing a\nlater NULL pointer dereference when the kernel attempts to store the\nregister state:\n\n| # ./sigreturn-za\n| Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000\n| Mem abort info:\n| ESR = 0x0000000096000046\n| EC = 0x25: DABT (current EL), IL = 32 bits\n| SET = 0, FnV = 0\n| EA = 0, S1PTW = 0\n| FSC = 0x06: level 2 translation fault\n| Data abort info:\n| ISV = 0, ISS = 0x00000046, ISS2 = 0x00000000\n| CM = 0, WnR = 1, TnD = 0, TagAccess = 0\n| GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0\n| user pgtable: 4k pages, 52-bit VAs, pgdp=0000000101f47c00\n| [0000000000000000] pgd=08000001021d8403, p4d=0800000102274403, pud=0800000102275403, pmd=0000000000000000\n| Internal error: Oops: 0000000096000046 [#1] SMP\n| Modules linked in:\n| CPU: 0 UID: 0 PID: 153 Comm: sigreturn-za Not tainted 6.19.0-rc1 #1 PREEMPT\n| Hardware name: linux,dummy-virt (DT)\n| pstate: 214000c9 (nzCv daIF +PAN -UAO -TCO +DIT -SSBS BTYPE=--)\n| pc : sve_save_state+0x4/0xf0\n| lr : fpsimd_save_user_state+0xb0/0x1c0\n| sp : ffff80008070bcc0\n| x29: ffff80008070bcc0 x28: fff00000c1ca4c40 x27: 63cfa172fb5cf658\n| x26: fff00000c1ca5228 x25: 0000000000000000 x24: 0000000000000000\n| x23: 0000000000000000 x22: fff00000c1ca4c40 x21: fff00000c1ca4c40\n| x20: 0000000000000020 x19: fff00000ff6900f0 x18: 0000000000000000\n| x17: fff05e8e0311f000 x16: 0000000000000000 x15: 028fca8f3bdaf21c\n| x14: 0000000000000212 x13: fff00000c0209f10 x12: 0000000000000020\n| x11: 0000000000200b20 x10: 0000000000000000 x9 : fff00000ff69dcc0\n| x8 : 00000000000003f2 x7 : 0000000000000001 x6 : fff00000c1ca5b48\n| x5 : fff05e8e0311f000 x4 : 0000000008000000 x3 : 0000000000000000\n| x2 : 0000000000000001 x1 : fff00000c1ca5970 x0 : 0000000000000440\n| Call trace:\n| sve_save_state+0x4/0xf0 (P)\n| fpsimd_thread_switch+0x48/0x198\n| __switch_to+0x20/0x1c0\n| __schedule+0x36c/0xce0\n| schedule+0x34/0x11c\n| exit_to_user_mode_loop+0x124/0x188\n| el0_interrupt+0xc8/0xd8\n| __el0_irq_handler_common+0x18/0x24\n| el0t_64_irq_handler+0x10/0x1c\n| el0t_64_irq+0x198/0x19c\n| Code: 54000040 d51b4408 d65f03c0 d503245f (e5bb5800)\n| ---[ end trace 0000000000000000 ]---\n\nFix this by having restore_za_context() ensure that the task\u0027s sve_state\nis allocated, matching what we do when taking an SME trap. Any live\nSVE/SSVE state (which is restored earlier from a separate signal\ncontext) must be preserved, and hence this is not zeroed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23107",
"url": "https://www.suse.com/security/cve/CVE-2026-23107"
},
{
"category": "external",
"summary": "SUSE Bug 1257762 for CVE-2026-23107",
"url": "https://bugzilla.suse.com/1257762"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2026-23107"
},
{
"cve": "CVE-2026-23108",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23108"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: usb_8dev: usb_8dev_read_bulk_callback(): fix URB memory leak\n\nFix similar memory leak as in commit 7352e1d5932a (\"can: gs_usb:\ngs_usb_receive_bulk_callback(): fix URB memory leak\").\n\nIn usb_8dev_open() -\u003e usb_8dev_start(), the URBs for USB-in transfers are\nallocated, added to the priv-\u003erx_submitted anchor and submitted. In the\ncomplete callback usb_8dev_read_bulk_callback(), the URBs are processed and\nresubmitted. In usb_8dev_close() -\u003e unlink_all_urbs() the URBs are freed by\ncalling usb_kill_anchored_urbs(\u0026priv-\u003erx_submitted).\n\nHowever, this does not take into account that the USB framework unanchors\nthe URB before the complete function is called. This means that once an\nin-URB has been completed, it is no longer anchored and is ultimately not\nreleased in usb_kill_anchored_urbs().\n\nFix the memory leak by anchoring the URB in the\nusb_8dev_read_bulk_callback() to the priv-\u003erx_submitted anchor.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23108",
"url": "https://www.suse.com/security/cve/CVE-2026-23108"
},
{
"category": "external",
"summary": "SUSE Bug 1257770 for CVE-2026-23108",
"url": "https://bugzilla.suse.com/1257770"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2026-23108"
},
{
"cve": "CVE-2026-23110",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23110"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: core: Wake up the error handler when final completions race against each other\n\nThe fragile ordering between marking commands completed or failed so\nthat the error handler only wakes when the last running command\ncompletes or times out has race conditions. These race conditions can\ncause the SCSI layer to fail to wake the error handler, leaving I/O\nthrough the SCSI host stuck as the error state cannot advance.\n\nFirst, there is an memory ordering issue within scsi_dec_host_busy().\nThe write which clears SCMD_STATE_INFLIGHT may be reordered with reads\ncounting in scsi_host_busy(). While the local CPU will see its own\nwrite, reordering can allow other CPUs in scsi_dec_host_busy() or\nscsi_eh_inc_host_failed() to see a raised busy count, causing no CPU to\nsee a host busy equal to the host_failed count.\n\nThis race condition can be prevented with a memory barrier on the error\npath to force the write to be visible before counting host busy\ncommands.\n\nSecond, there is a general ordering issue with scsi_eh_inc_host_failed(). By\ncounting busy commands before incrementing host_failed, it can race with a\nfinal command in scsi_dec_host_busy(), such that scsi_dec_host_busy() does\nnot see host_failed incremented but scsi_eh_inc_host_failed() counts busy\ncommands before SCMD_STATE_INFLIGHT is cleared by scsi_dec_host_busy(),\nresulting in neither waking the error handler task.\n\nThis needs the call to scsi_host_busy() to be moved after host_failed is\nincremented to close the race condition.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23110",
"url": "https://www.suse.com/security/cve/CVE-2026-23110"
},
{
"category": "external",
"summary": "SUSE Bug 1257761 for CVE-2026-23110",
"url": "https://bugzilla.suse.com/1257761"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2026-23110"
},
{
"cve": "CVE-2026-23111",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23111"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: fix inverted genmask check in nft_map_catchall_activate()\n\nnft_map_catchall_activate() has an inverted element activity check\ncompared to its non-catchall counterpart nft_mapelem_activate() and\ncompared to what is logically required.\n\nnft_map_catchall_activate() is called from the abort path to re-activate\ncatchall map elements that were deactivated during a failed transaction.\nIt should skip elements that are already active (they don\u0027t need\nre-activation) and process elements that are inactive (they need to be\nrestored). Instead, the current code does the opposite: it skips inactive\nelements and processes active ones.\n\nCompare the non-catchall activate callback, which is correct:\n\n nft_mapelem_activate():\n if (nft_set_elem_active(ext, iter-\u003egenmask))\n return 0; /* skip active, process inactive */\n\nWith the buggy catchall version:\n\n nft_map_catchall_activate():\n if (!nft_set_elem_active(ext, genmask))\n continue; /* skip inactive, process active */\n\nThe consequence is that when a DELSET operation is aborted,\nnft_setelem_data_activate() is never called for the catchall element.\nFor NFT_GOTO verdict elements, this means nft_data_hold() is never\ncalled to restore the chain-\u003euse reference count. Each abort cycle\npermanently decrements chain-\u003euse. Once chain-\u003euse reaches zero,\nDELCHAIN succeeds and frees the chain while catchall verdict elements\nstill reference it, resulting in a use-after-free.\n\nThis is exploitable for local privilege escalation from an unprivileged\nuser via user namespaces + nftables on distributions that enable\nCONFIG_USER_NS and CONFIG_NF_TABLES.\n\nFix by removing the negation so the check matches nft_mapelem_activate():\nskip active elements, process inactive ones.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23111",
"url": "https://www.suse.com/security/cve/CVE-2026-23111"
},
{
"category": "external",
"summary": "SUSE Bug 1258181 for CVE-2026-23111",
"url": "https://bugzilla.suse.com/1258181"
},
{
"category": "external",
"summary": "SUSE Bug 1258183 for CVE-2026-23111",
"url": "https://bugzilla.suse.com/1258183"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "important"
}
],
"title": "CVE-2026-23111"
},
{
"cve": "CVE-2026-23112",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23112"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvmet-tcp: add bounds checks in nvmet_tcp_build_pdu_iovec\n\nnvmet_tcp_build_pdu_iovec() could walk past cmd-\u003ereq.sg when a PDU\nlength or offset exceeds sg_cnt and then use bogus sg-\u003elength/offset\nvalues, leading to _copy_to_iter() GPF/KASAN. Guard sg_idx, remaining\nentries, and sg-\u003elength/offset before building the bvec.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23112",
"url": "https://www.suse.com/security/cve/CVE-2026-23112"
},
{
"category": "external",
"summary": "SUSE Bug 1258184 for CVE-2026-23112",
"url": "https://bugzilla.suse.com/1258184"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2026-23112"
},
{
"cve": "CVE-2026-23113",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23113"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring/io-wq: check IO_WQ_BIT_EXIT inside work run loop\n\nCurrently this is checked before running the pending work. Normally this\nis quite fine, as work items either end up blocking (which will create a\nnew worker for other items), or they complete fairly quickly. But syzbot\nreports an issue where io-wq takes seemingly forever to exit, and with a\nbit of debugging, this turns out to be because it queues a bunch of big\n(2GB - 4096b) reads with a /dev/msr* file. Since this file type doesn\u0027t\nsupport -\u003eread_iter(), loop_rw_iter() ends up handling them. Each read\nreturns 16MB of data read, which takes 20 (!!) seconds. With a bunch of\nthese pending, processing the whole chain can take a long time. Easily\nlonger than the syzbot uninterruptible sleep timeout of 140 seconds.\nThis then triggers a complaint off the io-wq exit path:\n\nINFO: task syz.4.135:6326 blocked for more than 143 seconds.\n Not tainted syzkaller #0\n Blocked by coredump.\n\"echo 0 \u003e /proc/sys/kernel/hung_task_timeout_secs\" disables this message.\ntask:syz.4.135 state:D stack:26824 pid:6326 tgid:6324 ppid:5957 task_flags:0x400548 flags:0x00080000\nCall Trace:\n \u003cTASK\u003e\n context_switch kernel/sched/core.c:5256 [inline]\n __schedule+0x1139/0x6150 kernel/sched/core.c:6863\n __schedule_loop kernel/sched/core.c:6945 [inline]\n schedule+0xe7/0x3a0 kernel/sched/core.c:6960\n schedule_timeout+0x257/0x290 kernel/time/sleep_timeout.c:75\n do_wait_for_common kernel/sched/completion.c:100 [inline]\n __wait_for_common+0x2fc/0x4e0 kernel/sched/completion.c:121\n io_wq_exit_workers io_uring/io-wq.c:1328 [inline]\n io_wq_put_and_exit+0x271/0x8a0 io_uring/io-wq.c:1356\n io_uring_clean_tctx+0x10d/0x190 io_uring/tctx.c:203\n io_uring_cancel_generic+0x69c/0x9a0 io_uring/cancel.c:651\n io_uring_files_cancel include/linux/io_uring.h:19 [inline]\n do_exit+0x2ce/0x2bd0 kernel/exit.c:911\n do_group_exit+0xd3/0x2a0 kernel/exit.c:1112\n get_signal+0x2671/0x26d0 kernel/signal.c:3034\n arch_do_signal_or_restart+0x8f/0x7e0 arch/x86/kernel/signal.c:337\n __exit_to_user_mode_loop kernel/entry/common.c:41 [inline]\n exit_to_user_mode_loop+0x8c/0x540 kernel/entry/common.c:75\n __exit_to_user_mode_prepare include/linux/irq-entry-common.h:226 [inline]\n syscall_exit_to_user_mode_prepare include/linux/irq-entry-common.h:256 [inline]\n syscall_exit_to_user_mode_work include/linux/entry-common.h:159 [inline]\n syscall_exit_to_user_mode include/linux/entry-common.h:194 [inline]\n do_syscall_64+0x4ee/0xf80 arch/x86/entry/syscall_64.c:100\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7fa02738f749\nRSP: 002b:00007fa0281ae0e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca\nRAX: fffffffffffffe00 RBX: 00007fa0275e6098 RCX: 00007fa02738f749\nRDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007fa0275e6098\nRBP: 00007fa0275e6090 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000\nR13: 00007fa0275e6128 R14: 00007fff14e4fcb0 R15: 00007fff14e4fd98\n\nThere\u0027s really nothing wrong here, outside of processing these reads\nwill take a LONG time. However, we can speed up the exit by checking the\nIO_WQ_BIT_EXIT inside the io_worker_handle_work() loop, as syzbot will\nexit the ring after queueing up all of these reads. Then once the first\nitem is processed, io-wq will simply cancel the rest. That should avoid\nsyzbot running into this complaint again.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23113",
"url": "https://www.suse.com/security/cve/CVE-2026-23113"
},
{
"category": "external",
"summary": "SUSE Bug 1258278 for CVE-2026-23113",
"url": "https://bugzilla.suse.com/1258278"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2026-23113"
},
{
"cve": "CVE-2026-23116",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23116"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npmdomain: imx8m-blk-ctrl: Remove separate rst and clk mask for 8mq vpu\n\nFor i.MX8MQ platform, the ADB in the VPUMIX domain has no separate reset\nand clock enable bits, but is ungated and reset together with the VPUs.\nSo we can\u0027t reset G1 or G2 separately, it may led to the system hang.\nRemove rst_mask and clk_mask of imx8mq_vpu_blk_ctl_domain_data.\nLet imx8mq_vpu_power_notifier() do really vpu reset.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23116",
"url": "https://www.suse.com/security/cve/CVE-2026-23116"
},
{
"category": "external",
"summary": "SUSE Bug 1258277 for CVE-2026-23116",
"url": "https://bugzilla.suse.com/1258277"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2026-23116"
},
{
"cve": "CVE-2026-23119",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23119"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbonding: provide a net pointer to __skb_flow_dissect()\n\nAfter 3cbf4ffba5ee (\"net: plumb network namespace into __skb_flow_dissect\")\nwe have to provide a net pointer to __skb_flow_dissect(),\neither via skb-\u003edev, skb-\u003esk, or a user provided pointer.\n\nIn the following case, syzbot was able to cook a bare skb.\n\nWARNING: net/core/flow_dissector.c:1131 at __skb_flow_dissect+0xb57/0x68b0 net/core/flow_dissector.c:1131, CPU#1: syz.2.1418/11053\nCall Trace:\n \u003cTASK\u003e\n bond_flow_dissect drivers/net/bonding/bond_main.c:4093 [inline]\n __bond_xmit_hash+0x2d7/0xba0 drivers/net/bonding/bond_main.c:4157\n bond_xmit_hash_xdp drivers/net/bonding/bond_main.c:4208 [inline]\n bond_xdp_xmit_3ad_xor_slave_get drivers/net/bonding/bond_main.c:5139 [inline]\n bond_xdp_get_xmit_slave+0x1fd/0x710 drivers/net/bonding/bond_main.c:5515\n xdp_master_redirect+0x13f/0x2c0 net/core/filter.c:4388\n bpf_prog_run_xdp include/net/xdp.h:700 [inline]\n bpf_test_run+0x6b2/0x7d0 net/bpf/test_run.c:421\n bpf_prog_test_run_xdp+0x795/0x10e0 net/bpf/test_run.c:1390\n bpf_prog_test_run+0x2c7/0x340 kernel/bpf/syscall.c:4703\n __sys_bpf+0x562/0x860 kernel/bpf/syscall.c:6182\n __do_sys_bpf kernel/bpf/syscall.c:6274 [inline]\n __se_sys_bpf kernel/bpf/syscall.c:6272 [inline]\n __x64_sys_bpf+0x7c/0x90 kernel/bpf/syscall.c:6272\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xec/0xf80 arch/x86/entry/syscall_64.c:94",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23119",
"url": "https://www.suse.com/security/cve/CVE-2026-23119"
},
{
"category": "external",
"summary": "SUSE Bug 1258273 for CVE-2026-23119",
"url": "https://bugzilla.suse.com/1258273"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2026-23119"
},
{
"cve": "CVE-2026-23121",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23121"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmISDN: annotate data-race around dev-\u003ework\n\ndev-\u003ework can re read locklessly in mISDN_read()\nand mISDN_poll(). Add READ_ONCE()/WRITE_ONCE() annotations.\n\nBUG: KCSAN: data-race in mISDN_ioctl / mISDN_read\n\nwrite to 0xffff88812d848280 of 4 bytes by task 10864 on cpu 1:\n misdn_add_timer drivers/isdn/mISDN/timerdev.c:175 [inline]\n mISDN_ioctl+0x2fb/0x550 drivers/isdn/mISDN/timerdev.c:233\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:597 [inline]\n __se_sys_ioctl+0xce/0x140 fs/ioctl.c:583\n __x64_sys_ioctl+0x43/0x50 fs/ioctl.c:583\n x64_sys_call+0x14b0/0x3000 arch/x86/include/generated/asm/syscalls_64.h:17\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xd8/0x2c0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nread to 0xffff88812d848280 of 4 bytes by task 10857 on cpu 0:\n mISDN_read+0x1f2/0x470 drivers/isdn/mISDN/timerdev.c:112\n do_loop_readv_writev fs/read_write.c:847 [inline]\n vfs_readv+0x3fb/0x690 fs/read_write.c:1020\n do_readv+0xe7/0x210 fs/read_write.c:1080\n __do_sys_readv fs/read_write.c:1165 [inline]\n __se_sys_readv fs/read_write.c:1162 [inline]\n __x64_sys_readv+0x45/0x50 fs/read_write.c:1162\n x64_sys_call+0x2831/0x3000 arch/x86/include/generated/asm/syscalls_64.h:20\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xd8/0x2c0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nvalue changed: 0x00000000 -\u003e 0x00000001",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23121",
"url": "https://www.suse.com/security/cve/CVE-2026-23121"
},
{
"category": "external",
"summary": "SUSE Bug 1258309 for CVE-2026-23121",
"url": "https://bugzilla.suse.com/1258309"
},
{
"category": "external",
"summary": "SUSE Bug 1259135 for CVE-2026-23121",
"url": "https://bugzilla.suse.com/1259135"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "important"
}
],
"title": "CVE-2026-23121"
},
{
"cve": "CVE-2026-23129",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23129"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndpll: Prevent duplicate registrations\n\nModify the internal registration helpers dpll_xa_ref_{dpll,pin}_add()\nto reject duplicate registration attempts.\n\nPreviously, if a caller attempted to register the same pin multiple\ntimes (with the same ops, priv, and cookie) on the same device, the core\nsilently increments the reference count and return success. This behavior\nis incorrect because if the caller makes these duplicate registrations\nthen for the first one dpll_pin_registration is allocated and for others\nthe associated dpll_pin_ref.refcount is incremented. During the first\nunregistration the associated dpll_pin_registration is freed and for\nothers WARN is fired.\n\nFix this by updating the logic to return `-EEXIST` if a matching\nregistration is found to enforce a strict \"register once\" policy.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23129",
"url": "https://www.suse.com/security/cve/CVE-2026-23129"
},
{
"category": "external",
"summary": "SUSE Bug 1258299 for CVE-2026-23129",
"url": "https://bugzilla.suse.com/1258299"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2026-23129"
},
{
"cve": "CVE-2026-23133",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23133"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath10k: fix dma_free_coherent() pointer\n\ndma_alloc_coherent() allocates a DMA mapped buffer and stores the\naddresses in XXX_unaligned fields. Those should be reused when freeing\nthe buffer rather than the aligned addresses.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23133",
"url": "https://www.suse.com/security/cve/CVE-2026-23133"
},
{
"category": "external",
"summary": "SUSE Bug 1258249 for CVE-2026-23133",
"url": "https://bugzilla.suse.com/1258249"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2026-23133"
},
{
"cve": "CVE-2026-23135",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23135"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath12k: fix dma_free_coherent() pointer\n\ndma_alloc_coherent() allocates a DMA mapped buffer and stores the\naddresses in XXX_unaligned fields. Those should be reused when freeing\nthe buffer rather than the aligned addresses.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23135",
"url": "https://www.suse.com/security/cve/CVE-2026-23135"
},
{
"category": "external",
"summary": "SUSE Bug 1258245 for CVE-2026-23135",
"url": "https://bugzilla.suse.com/1258245"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2026-23135"
},
{
"cve": "CVE-2026-23139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23139"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_conncount: update last_gc only when GC has been performed\n\nCurrently last_gc is being updated everytime a new connection is\ntracked, that means that it is updated even if a GC wasn\u0027t performed.\nWith a sufficiently high packet rate, it is possible to always bypass\nthe GC, causing the list to grow infinitely.\n\nUpdate the last_gc value only when a GC has been actually performed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23139",
"url": "https://www.suse.com/security/cve/CVE-2026-23139"
},
{
"category": "external",
"summary": "SUSE Bug 1258304 for CVE-2026-23139",
"url": "https://bugzilla.suse.com/1258304"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2026-23139"
},
{
"cve": "CVE-2026-23141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23141"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: send: check for inline extents in range_is_hole_in_parent()\n\nBefore accessing the disk_bytenr field of a file extent item we need\nto check if we are dealing with an inline extent.\nThis is because for inline extents their data starts at the offset of\nthe disk_bytenr field. So accessing the disk_bytenr\nmeans we are accessing inline data or in case the inline data is less\nthan 8 bytes we can actually cause an invalid\nmemory access if this inline extent item is the first item in the leaf\nor access metadata from other items.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23141",
"url": "https://www.suse.com/security/cve/CVE-2026-23141"
},
{
"category": "external",
"summary": "SUSE Bug 1258377 for CVE-2026-23141",
"url": "https://bugzilla.suse.com/1258377"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2026-23141"
},
{
"cve": "CVE-2026-23145",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23145"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: fix iloc.bh leak in ext4_xattr_inode_update_ref\n\nThe error branch for ext4_xattr_inode_update_ref forget to release the\nrefcount for iloc.bh. Find this when review code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23145",
"url": "https://www.suse.com/security/cve/CVE-2026-23145"
},
{
"category": "external",
"summary": "SUSE Bug 1258326 for CVE-2026-23145",
"url": "https://bugzilla.suse.com/1258326"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2026-23145"
},
{
"cve": "CVE-2026-23146",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23146"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: hci_uart: fix null-ptr-deref in hci_uart_write_work\n\nhci_uart_set_proto() sets HCI_UART_PROTO_INIT before calling\nhci_uart_register_dev(), which calls proto-\u003eopen() to initialize\nhu-\u003epriv. However, if a TTY write wakeup occurs during this window,\nhci_uart_tx_wakeup() may schedule write_work before hu-\u003epriv is\ninitialized, leading to a NULL pointer dereference in\nhci_uart_write_work() when proto-\u003edequeue() accesses hu-\u003epriv.\n\nThe race condition is:\n\n CPU0 CPU1\n ---- ----\n hci_uart_set_proto()\n set_bit(HCI_UART_PROTO_INIT)\n hci_uart_register_dev()\n tty write wakeup\n hci_uart_tty_wakeup()\n hci_uart_tx_wakeup()\n schedule_work(\u0026hu-\u003ewrite_work)\n proto-\u003eopen(hu)\n // initializes hu-\u003epriv\n hci_uart_write_work()\n hci_uart_dequeue()\n proto-\u003edequeue(hu)\n // accesses hu-\u003epriv (NULL!)\n\nFix this by moving set_bit(HCI_UART_PROTO_INIT) after proto-\u003eopen()\nsucceeds, ensuring hu-\u003epriv is initialized before any work can be\nscheduled.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23146",
"url": "https://www.suse.com/security/cve/CVE-2026-23146"
},
{
"category": "external",
"summary": "SUSE Bug 1258234 for CVE-2026-23146",
"url": "https://bugzilla.suse.com/1258234"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2026-23146"
},
{
"cve": "CVE-2026-23150",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23150"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfc: llcp: Fix memleak in nfc_llcp_send_ui_frame().\n\nsyzbot reported various memory leaks related to NFC, struct\nnfc_llcp_sock, sk_buff, nfc_dev, etc. [0]\n\nThe leading log hinted that nfc_llcp_send_ui_frame() failed\nto allocate skb due to sock_error(sk) being -ENXIO.\n\nENXIO is set by nfc_llcp_socket_release() when struct\nnfc_llcp_local is destroyed by local_cleanup().\n\nThe problem is that there is no synchronisation between\nnfc_llcp_send_ui_frame() and local_cleanup(), and skb\ncould be put into local-\u003etx_queue after it was purged in\nlocal_cleanup():\n\n CPU1 CPU2\n ---- ----\n nfc_llcp_send_ui_frame() local_cleanup()\n |- do { \u0027\n |- pdu = nfc_alloc_send_skb(..., \u0026err)\n | .\n | |- nfc_llcp_socket_release(local, false, ENXIO);\n | |- skb_queue_purge(\u0026local-\u003etx_queue); |\n | \u0027 |\n |- skb_queue_tail(\u0026local-\u003etx_queue, pdu); |\n ... |\n |- pdu = nfc_alloc_send_skb(..., \u0026err) |\n ^._________________________________.\u0027\n\nlocal_cleanup() is called for struct nfc_llcp_local only\nafter nfc_llcp_remove_local() unlinks it from llcp_devices.\n\nIf we hold local-\u003etx_queue.lock then, we can synchronise\nthe thread and nfc_llcp_send_ui_frame().\n\nLet\u0027s do that and check list_empty(\u0026local-\u003elist) before\nqueuing skb to local-\u003etx_queue in nfc_llcp_send_ui_frame().\n\n[0]:\n[ 56.074943][ T6096] llcp: nfc_llcp_send_ui_frame: Could not allocate PDU (error=-6)\n[ 64.318868][ T5813] kmemleak: 6 new suspected memory leaks (see /sys/kernel/debug/kmemleak)\nBUG: memory leak\nunreferenced object 0xffff8881272f6800 (size 1024):\n comm \"syz.0.17\", pid 6096, jiffies 4294942766\n hex dump (first 32 bytes):\n 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n 27 00 03 40 00 00 00 00 00 00 00 00 00 00 00 00 \u0027..@............\n backtrace (crc da58d84d):\n kmemleak_alloc_recursive include/linux/kmemleak.h:44 [inline]\n slab_post_alloc_hook mm/slub.c:4979 [inline]\n slab_alloc_node mm/slub.c:5284 [inline]\n __do_kmalloc_node mm/slub.c:5645 [inline]\n __kmalloc_noprof+0x3e3/0x6b0 mm/slub.c:5658\n kmalloc_noprof include/linux/slab.h:961 [inline]\n sk_prot_alloc+0x11a/0x1b0 net/core/sock.c:2239\n sk_alloc+0x36/0x360 net/core/sock.c:2295\n nfc_llcp_sock_alloc+0x37/0x130 net/nfc/llcp_sock.c:979\n llcp_sock_create+0x71/0xd0 net/nfc/llcp_sock.c:1044\n nfc_sock_create+0xc9/0xf0 net/nfc/af_nfc.c:31\n __sock_create+0x1a9/0x340 net/socket.c:1605\n sock_create net/socket.c:1663 [inline]\n __sys_socket_create net/socket.c:1700 [inline]\n __sys_socket+0xb9/0x1a0 net/socket.c:1747\n __do_sys_socket net/socket.c:1761 [inline]\n __se_sys_socket net/socket.c:1759 [inline]\n __x64_sys_socket+0x1b/0x30 net/socket.c:1759\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xa4/0xfa0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nBUG: memory leak\nunreferenced object 0xffff88810fbd9800 (size 240):\n comm \"syz.0.17\", pid 6096, jiffies 4294942850\n hex dump (first 32 bytes):\n 68 f0 ff 08 81 88 ff ff 68 f0 ff 08 81 88 ff ff h.......h.......\n 00 00 00 00 00 00 00 00 00 68 2f 27 81 88 ff ff .........h/\u0027....\n backtrace (crc 6cc652b1):\n kmemleak_alloc_recursive include/linux/kmemleak.h:44 [inline]\n slab_post_alloc_hook mm/slub.c:4979 [inline]\n slab_alloc_node mm/slub.c:5284 [inline]\n kmem_cache_alloc_node_noprof+0x36f/0x5e0 mm/slub.c:5336\n __alloc_skb+0x203/0x240 net/core/skbuff.c:660\n alloc_skb include/linux/skbuff.h:1383 [inline]\n alloc_skb_with_frags+0x69/0x3f0 net/core/sk\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23150",
"url": "https://www.suse.com/security/cve/CVE-2026-23150"
},
{
"category": "external",
"summary": "SUSE Bug 1258354 for CVE-2026-23150",
"url": "https://bugzilla.suse.com/1258354"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2026-23150"
},
{
"cve": "CVE-2026-23151",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23151"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: MGMT: Fix memory leak in set_ssp_complete\n\nFix memory leak in set_ssp_complete() where mgmt_pending_cmd structures\nare not freed after being removed from the pending list.\n\nCommit 302a1f674c00 (\"Bluetooth: MGMT: Fix possible UAFs\") replaced\nmgmt_pending_foreach() calls with individual command handling but missed\nadding mgmt_pending_free() calls in both error and success paths of\nset_ssp_complete(). Other completion functions like set_le_complete()\nwere fixed correctly in the same commit.\n\nThis causes a memory leak of the mgmt_pending_cmd structure and its\nassociated parameter data for each SSP command that completes.\n\nAdd the missing mgmt_pending_free(cmd) calls in both code paths to fix\nthe memory leak. Also fix the same issue in set_advertising_complete().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23151",
"url": "https://www.suse.com/security/cve/CVE-2026-23151"
},
{
"category": "external",
"summary": "SUSE Bug 1258237 for CVE-2026-23151",
"url": "https://bugzilla.suse.com/1258237"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2026-23151"
},
{
"cve": "CVE-2026-23152",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23152"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mac80211: correctly decode TTLM with default link map\n\nTID-To-Link Mapping (TTLM) elements do not contain any link mapping\npresence indicator if a default mapping is used and parsing needs to be\nskipped.\n\nNote that access points should not explicitly report an advertised TTLM\nwith a default mapping as that is the implied mapping if the element is\nnot included, this is even the case when switching back to the default\nmapping. However, mac80211 would incorrectly parse the frame and would\nalso read one byte beyond the end of the element.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23152",
"url": "https://www.suse.com/security/cve/CVE-2026-23152"
},
{
"category": "external",
"summary": "SUSE Bug 1258252 for CVE-2026-23152",
"url": "https://bugzilla.suse.com/1258252"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2026-23152"
},
{
"cve": "CVE-2026-23155",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23155"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: gs_usb: gs_usb_receive_bulk_callback(): fix error message\n\nSinc commit 79a6d1bfe114 (\"can: gs_usb: gs_usb_receive_bulk_callback():\nunanchor URL on usb_submit_urb() error\") a failing resubmit URB will print\nan info message.\n\nIn the case of a short read where netdev has not yet been assigned,\ninitialize as NULL to avoid dereferencing an undefined value. Also report\nthe error value of the failed resubmit.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23155",
"url": "https://www.suse.com/security/cve/CVE-2026-23155"
},
{
"category": "external",
"summary": "SUSE Bug 1258313 for CVE-2026-23155",
"url": "https://bugzilla.suse.com/1258313"
},
{
"category": "external",
"summary": "SUSE Bug 1258315 for CVE-2026-23155",
"url": "https://bugzilla.suse.com/1258315"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "important"
}
],
"title": "CVE-2026-23155"
},
{
"cve": "CVE-2026-23156",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23156"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nefivarfs: fix error propagation in efivar_entry_get()\n\nefivar_entry_get() always returns success even if the underlying\n__efivar_entry_get() fails, masking errors.\n\nThis may result in uninitialized heap memory being copied to userspace\nin the efivarfs_file_read() path.\n\nFix it by returning the error from __efivar_entry_get().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23156",
"url": "https://www.suse.com/security/cve/CVE-2026-23156"
},
{
"category": "external",
"summary": "SUSE Bug 1258317 for CVE-2026-23156",
"url": "https://bugzilla.suse.com/1258317"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2026-23156"
},
{
"cve": "CVE-2026-23163",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23163"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: fix NULL pointer dereference in amdgpu_gmc_filter_faults_remove\n\nOn APUs such as Raven and Renoir (GC 9.1.0, 9.2.2, 9.3.0), the ih1 and\nih2 interrupt ring buffers are not initialized. This is by design, as\nthese secondary IH rings are only available on discrete GPUs. See\nvega10_ih_sw_init() which explicitly skips ih1/ih2 initialization when\nAMD_IS_APU is set.\n\nHowever, amdgpu_gmc_filter_faults_remove() unconditionally uses ih1 to\nget the timestamp of the last interrupt entry. When retry faults are\nenabled on APUs (noretry=0), this function is called from the SVM page\nfault recovery path, resulting in a NULL pointer dereference when\namdgpu_ih_decode_iv_ts_helper() attempts to access ih-\u003ering[].\n\nThe crash manifests as:\n\n BUG: kernel NULL pointer dereference, address: 0000000000000004\n RIP: 0010:amdgpu_ih_decode_iv_ts_helper+0x22/0x40 [amdgpu]\n Call Trace:\n amdgpu_gmc_filter_faults_remove+0x60/0x130 [amdgpu]\n svm_range_restore_pages+0xae5/0x11c0 [amdgpu]\n amdgpu_vm_handle_fault+0xc8/0x340 [amdgpu]\n gmc_v9_0_process_interrupt+0x191/0x220 [amdgpu]\n amdgpu_irq_dispatch+0xed/0x2c0 [amdgpu]\n amdgpu_ih_process+0x84/0x100 [amdgpu]\n\nThis issue was exposed by commit 1446226d32a4 (\"drm/amdgpu: Remove GC HW\nIP 9.3.0 from noretry=1\") which changed the default for Renoir APU from\nnoretry=1 to noretry=0, enabling retry fault handling and thus\nexercising the buggy code path.\n\nFix this by adding a check for ih1.ring_size before attempting to use\nit. Also restore the soft_ih support from commit dd299441654f (\"drm/amdgpu:\nRework retry fault removal\"). This is needed if the hardware doesn\u0027t\nsupport secondary HW IH rings.\n\nv2: additional updates (Alex)\n\n(cherry picked from commit 6ce8d536c80aa1f059e82184f0d1994436b1d526)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23163",
"url": "https://www.suse.com/security/cve/CVE-2026-23163"
},
{
"category": "external",
"summary": "SUSE Bug 1258544 for CVE-2026-23163",
"url": "https://bugzilla.suse.com/1258544"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2026-23163"
},
{
"cve": "CVE-2026-23166",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23166"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nice: Fix NULL pointer dereference in ice_vsi_set_napi_queues\n\nAdd NULL pointer checks in ice_vsi_set_napi_queues() to prevent crashes\nduring resume from suspend when rings[q_idx]-\u003eq_vector is NULL.\n\nTested adaptor:\n60:00.0 Ethernet controller [0200]: Intel Corporation Ethernet Controller E810-XXV for SFP [8086:159b] (rev 02)\n Subsystem: Intel Corporation Ethernet Network Adapter E810-XXV-2 [8086:4003]\n\nSR-IOV state: both disabled and enabled can reproduce this issue.\n\nkernel version: v6.18\n\nReproduce steps:\nBoot up and execute suspend like systemctl suspend or rtcwake.\n\nLog:\n\u003c1\u003e[ 231.443607] BUG: kernel NULL pointer dereference, address: 0000000000000040\n\u003c1\u003e[ 231.444052] #PF: supervisor read access in kernel mode\n\u003c1\u003e[ 231.444484] #PF: error_code(0x0000) - not-present page\n\u003c6\u003e[ 231.444913] PGD 0 P4D 0\n\u003c4\u003e[ 231.445342] Oops: Oops: 0000 [#1] SMP NOPTI\n\u003c4\u003e[ 231.446635] RIP: 0010:netif_queue_set_napi+0xa/0x170\n\u003c4\u003e[ 231.447067] Code: 31 f6 31 ff c3 cc cc cc cc 0f 1f 80 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1f 44 00 00 48 85 c9 74 0b \u003c48\u003e 83 79 30 00 0f 84 39 01 00 00 55 41 89 d1 49 89 f8 89 f2 48 89\n\u003c4\u003e[ 231.447513] RSP: 0018:ffffcc780fc078c0 EFLAGS: 00010202\n\u003c4\u003e[ 231.447961] RAX: ffff8b848ca30400 RBX: ffff8b848caf2028 RCX: 0000000000000010\n\u003c4\u003e[ 231.448443] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff8b848dbd4000\n\u003c4\u003e[ 231.448896] RBP: ffffcc780fc078e8 R08: 0000000000000000 R09: 0000000000000000\n\u003c4\u003e[ 231.449345] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000001\n\u003c4\u003e[ 231.449817] R13: ffff8b848dbd4000 R14: ffff8b84833390c8 R15: 0000000000000000\n\u003c4\u003e[ 231.450265] FS: 00007c7b29e9d740(0000) GS:ffff8b8c068e2000(0000) knlGS:0000000000000000\n\u003c4\u003e[ 231.450715] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n\u003c4\u003e[ 231.451179] CR2: 0000000000000040 CR3: 000000030626f004 CR4: 0000000000f72ef0\n\u003c4\u003e[ 231.451629] PKRU: 55555554\n\u003c4\u003e[ 231.452076] Call Trace:\n\u003c4\u003e[ 231.452549] \u003cTASK\u003e\n\u003c4\u003e[ 231.452996] ? ice_vsi_set_napi_queues+0x4d/0x110 [ice]\n\u003c4\u003e[ 231.453482] ice_resume+0xfd/0x220 [ice]\n\u003c4\u003e[ 231.453977] ? __pfx_pci_pm_resume+0x10/0x10\n\u003c4\u003e[ 231.454425] pci_pm_resume+0x8c/0x140\n\u003c4\u003e[ 231.454872] ? __pfx_pci_pm_resume+0x10/0x10\n\u003c4\u003e[ 231.455347] dpm_run_callback+0x5f/0x160\n\u003c4\u003e[ 231.455796] ? dpm_wait_for_superior+0x107/0x170\n\u003c4\u003e[ 231.456244] device_resume+0x177/0x270\n\u003c4\u003e[ 231.456708] dpm_resume+0x209/0x2f0\n\u003c4\u003e[ 231.457151] dpm_resume_end+0x15/0x30\n\u003c4\u003e[ 231.457596] suspend_devices_and_enter+0x1da/0x2b0\n\u003c4\u003e[ 231.458054] enter_state+0x10e/0x570\n\nAdd defensive checks for both the ring pointer and its q_vector\nbefore dereferencing, allowing the system to resume successfully even when\nq_vectors are unmapped.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23166",
"url": "https://www.suse.com/security/cve/CVE-2026-23166"
},
{
"category": "external",
"summary": "SUSE Bug 1258272 for CVE-2026-23166",
"url": "https://bugzilla.suse.com/1258272"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2026-23166"
},
{
"cve": "CVE-2026-23167",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23167"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfc: nci: Fix race between rfkill and nci_unregister_device().\n\nsyzbot reported the splat below [0] without a repro.\n\nIt indicates that struct nci_dev.cmd_wq had been destroyed before\nnci_close_device() was called via rfkill.\n\nnci_dev.cmd_wq is only destroyed in nci_unregister_device(), which\n(I think) was called from virtual_ncidev_close() when syzbot close()d\nan fd of virtual_ncidev.\n\nThe problem is that nci_unregister_device() destroys nci_dev.cmd_wq\nfirst and then calls nfc_unregister_device(), which removes the\ndevice from rfkill by rfkill_unregister().\n\nSo, the device is still visible via rfkill even after nci_dev.cmd_wq\nis destroyed.\n\nLet\u0027s unregister the device from rfkill first in nci_unregister_device().\n\nNote that we cannot call nfc_unregister_device() before\nnci_close_device() because\n\n 1) nfc_unregister_device() calls device_del() which frees\n all memory allocated by devm_kzalloc() and linked to\n ndev-\u003econn_info_list\n\n 2) nci_rx_work() could try to queue nci_conn_info to\n ndev-\u003econn_info_list which could be leaked\n\nThus, nfc_unregister_device() is split into two functions so we\ncan remove rfkill interfaces only before nci_close_device().\n\n[0]:\nDEBUG_LOCKS_WARN_ON(1)\nWARNING: kernel/locking/lockdep.c:238 at hlock_class kernel/locking/lockdep.c:238 [inline], CPU#0: syz.0.8675/6349\nWARNING: kernel/locking/lockdep.c:238 at check_wait_context kernel/locking/lockdep.c:4854 [inline], CPU#0: syz.0.8675/6349\nWARNING: kernel/locking/lockdep.c:238 at __lock_acquire+0x39d/0x2cf0 kernel/locking/lockdep.c:5187, CPU#0: syz.0.8675/6349\nModules linked in:\nCPU: 0 UID: 0 PID: 6349 Comm: syz.0.8675 Not tainted syzkaller #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026\nRIP: 0010:hlock_class kernel/locking/lockdep.c:238 [inline]\nRIP: 0010:check_wait_context kernel/locking/lockdep.c:4854 [inline]\nRIP: 0010:__lock_acquire+0x3a4/0x2cf0 kernel/locking/lockdep.c:5187\nCode: 18 00 4c 8b 74 24 08 75 27 90 e8 17 f2 fc 02 85 c0 74 1c 83 3d 50 e0 4e 0e 00 75 13 48 8d 3d 43 f7 51 0e 48 c7 c6 8b 3a de 8d \u003c67\u003e 48 0f b9 3a 90 31 c0 0f b6 98 c4 00 00 00 41 8b 45 20 25 ff 1f\nRSP: 0018:ffffc9000c767680 EFLAGS: 00010046\nRAX: 0000000000000001 RBX: 0000000000040000 RCX: 0000000000080000\nRDX: ffffc90013080000 RSI: ffffffff8dde3a8b RDI: ffffffff8ff24ca0\nRBP: 0000000000000003 R08: ffffffff8fef35a3 R09: 1ffffffff1fde6b4\nR10: dffffc0000000000 R11: fffffbfff1fde6b5 R12: 00000000000012a2\nR13: ffff888030338ba8 R14: ffff888030338000 R15: ffff888030338b30\nFS: 00007fa5995f66c0(0000) GS:ffff8881256f8000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007f7e72f842d0 CR3: 00000000485a0000 CR4: 00000000003526f0\nCall Trace:\n \u003cTASK\u003e\n lock_acquire+0x106/0x330 kernel/locking/lockdep.c:5868\n touch_wq_lockdep_map+0xcb/0x180 kernel/workqueue.c:3940\n __flush_workqueue+0x14b/0x14f0 kernel/workqueue.c:3982\n nci_close_device+0x302/0x630 net/nfc/nci/core.c:567\n nci_dev_down+0x3b/0x50 net/nfc/nci/core.c:639\n nfc_dev_down+0x152/0x290 net/nfc/core.c:161\n nfc_rfkill_set_block+0x2d/0x100 net/nfc/core.c:179\n rfkill_set_block+0x1d2/0x440 net/rfkill/core.c:346\n rfkill_fop_write+0x461/0x5a0 net/rfkill/core.c:1301\n vfs_write+0x29a/0xb90 fs/read_write.c:684\n ksys_write+0x150/0x270 fs/read_write.c:738\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xe2/0xf80 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7fa59b39acb9\nCode: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007fa5995f6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001\nRAX: ffffffffffffffda RBX: 00007fa59b615fa0 RCX: 00007fa59b39acb9\nRDX: 0000000000000008 RSI: 0000200000000080 RDI: 0000000000000007\nRBP: 00007fa59b408bf7 R08: \n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23167",
"url": "https://www.suse.com/security/cve/CVE-2026-23167"
},
{
"category": "external",
"summary": "SUSE Bug 1258374 for CVE-2026-23167",
"url": "https://bugzilla.suse.com/1258374"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2026-23167"
},
{
"cve": "CVE-2026-23170",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23170"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/imx/tve: fix probe device leak\n\nMake sure to drop the reference taken to the DDC device during probe on\nprobe failure (e.g. probe deferral) and on driver unbind.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23170",
"url": "https://www.suse.com/security/cve/CVE-2026-23170"
},
{
"category": "external",
"summary": "SUSE Bug 1258379 for CVE-2026-23170",
"url": "https://bugzilla.suse.com/1258379"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2026-23170"
},
{
"cve": "CVE-2026-23171",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23171"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbonding: fix use-after-free due to enslave fail after slave array update\n\nFix a use-after-free which happens due to enslave failure after the new\nslave has been added to the array. Since the new slave can be used for Tx\nimmediately, we can use it after it has been freed by the enslave error\ncleanup path which frees the allocated slave memory. Slave update array is\nsupposed to be called last when further enslave failures are not expected.\nMove it after xdp setup to avoid any problems.\n\nIt is very easy to reproduce the problem with a simple xdp_pass prog:\n ip l add bond1 type bond mode balance-xor\n ip l set bond1 up\n ip l set dev bond1 xdp object xdp_pass.o sec xdp_pass\n ip l add dumdum type dummy\n\nThen run in parallel:\n while :; do ip l set dumdum master bond1 1\u003e/dev/null 2\u003e\u00261; done;\n mausezahn bond1 -a own -b rand -A rand -B 1.1.1.1 -c 0 -t tcp \"dp=1-1023, flags=syn\"\n\nThe crash happens almost immediately:\n [ 605.602850] Oops: general protection fault, probably for non-canonical address 0xe0e6fc2460000137: 0000 [#1] SMP KASAN NOPTI\n [ 605.602916] KASAN: maybe wild-memory-access in range [0x07380123000009b8-0x07380123000009bf]\n [ 605.602946] CPU: 0 UID: 0 PID: 2445 Comm: mausezahn Kdump: loaded Tainted: G B 6.19.0-rc6+ #21 PREEMPT(voluntary)\n [ 605.602979] Tainted: [B]=BAD_PAGE\n [ 605.602998] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014\n [ 605.603032] RIP: 0010:netdev_core_pick_tx+0xcd/0x210\n [ 605.603063] Code: 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 3e 01 00 00 48 b8 00 00 00 00 00 fc ff df 4c 8b 6b 08 49 8d 7d 30 48 89 fa 48 c1 ea 03 \u003c80\u003e 3c 02 00 0f 85 25 01 00 00 49 8b 45 30 4c 89 e2 48 89 ee 48 89\n [ 605.603111] RSP: 0018:ffff88817b9af348 EFLAGS: 00010213\n [ 605.603145] RAX: dffffc0000000000 RBX: ffff88817d28b420 RCX: 0000000000000000\n [ 605.603172] RDX: 00e7002460000137 RSI: 0000000000000008 RDI: 07380123000009be\n [ 605.603199] RBP: ffff88817b541a00 R08: 0000000000000001 R09: fffffbfff3ed8c0c\n [ 605.603226] R10: ffffffff9f6c6067 R11: 0000000000000001 R12: 0000000000000000\n [ 605.603253] R13: 073801230000098e R14: ffff88817d28b448 R15: ffff88817b541a84\n [ 605.603286] FS: 00007f6570ef67c0(0000) GS:ffff888221dfa000(0000) knlGS:0000000000000000\n [ 605.603319] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n [ 605.603343] CR2: 00007f65712fae40 CR3: 000000011371b000 CR4: 0000000000350ef0\n [ 605.603373] Call Trace:\n [ 605.603392] \u003cTASK\u003e\n [ 605.603410] __dev_queue_xmit+0x448/0x32a0\n [ 605.603434] ? __pfx_vprintk_emit+0x10/0x10\n [ 605.603461] ? __pfx_vprintk_emit+0x10/0x10\n [ 605.603484] ? __pfx___dev_queue_xmit+0x10/0x10\n [ 605.603507] ? bond_start_xmit+0xbfb/0xc20 [bonding]\n [ 605.603546] ? _printk+0xcb/0x100\n [ 605.603566] ? __pfx__printk+0x10/0x10\n [ 605.603589] ? bond_start_xmit+0xbfb/0xc20 [bonding]\n [ 605.603627] ? add_taint+0x5e/0x70\n [ 605.603648] ? add_taint+0x2a/0x70\n [ 605.603670] ? end_report.cold+0x51/0x75\n [ 605.603693] ? bond_start_xmit+0xbfb/0xc20 [bonding]\n [ 605.603731] bond_start_xmit+0x623/0xc20 [bonding]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23171",
"url": "https://www.suse.com/security/cve/CVE-2026-23171"
},
{
"category": "external",
"summary": "SUSE Bug 1258349 for CVE-2026-23171",
"url": "https://bugzilla.suse.com/1258349"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2026-23171"
},
{
"cve": "CVE-2026-23172",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23172"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: wwan: t7xx: fix potential skb-\u003efrags overflow in RX path\n\nWhen receiving data in the DPMAIF RX path,\nthe t7xx_dpmaif_set_frag_to_skb() function adds\npage fragments to an skb without checking if the number of\nfragments has exceeded MAX_SKB_FRAGS. This could lead to a buffer overflow\nin skb_shinfo(skb)-\u003efrags[] array, corrupting adjacent memory and\npotentially causing kernel crashes or other undefined behavior.\n\nThis issue was identified through static code analysis by comparing with a\nsimilar vulnerability fixed in the mt76 driver commit b102f0c522cf (\"mt76:\nfix array overflow on receiving too many fragments for a packet\").\n\nThe vulnerability could be triggered if the modem firmware sends packets\nwith excessive fragments. While under normal protocol conditions (MTU 3080\nbytes, BAT buffer 3584 bytes),\na single packet should not require additional\nfragments, the kernel should not blindly trust firmware behavior.\nMalicious, buggy, or compromised firmware could potentially craft packets\nwith more fragments than the kernel expects.\n\nFix this by adding a bounds check before calling skb_add_rx_frag() to\nensure nr_frags does not exceed MAX_SKB_FRAGS.\n\nThe check must be performed before unmapping to avoid a page leak\nand double DMA unmap during device teardown.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23172",
"url": "https://www.suse.com/security/cve/CVE-2026-23172"
},
{
"category": "external",
"summary": "SUSE Bug 1258519 for CVE-2026-23172",
"url": "https://bugzilla.suse.com/1258519"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2026-23172"
},
{
"cve": "CVE-2026-23173",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23173"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5e: TC, delete flows only for existing peers\n\nWhen deleting TC steering flows, iterate only over actual devcom\npeers instead of assuming all possible ports exist. This avoids\ntouching non-existent peers and ensures cleanup is limited to\ndevices the driver is currently connected to.\n\n BUG: kernel NULL pointer dereference, address: 0000000000000008\n #PF: supervisor write access in kernel mode\n #PF: error_code(0x0002) - not-present page\n PGD 133c8a067 P4D 0\n Oops: Oops: 0002 [#1] SMP\n CPU: 19 UID: 0 PID: 2169 Comm: tc Not tainted 6.18.0+ #156 NONE\n Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014\n RIP: 0010:mlx5e_tc_del_fdb_peers_flow+0xbe/0x200 [mlx5_core]\n Code: 00 00 a8 08 74 a8 49 8b 46 18 f6 c4 02 74 9f 4c 8d bf a0 12 00 00 4c 89 ff e8 0e e7 96 e1 49 8b 44 24 08 49 8b 0c 24 4c 89 ff \u003c48\u003e 89 41 08 48 89 08 49 89 2c 24 49 89 5c 24 08 e8 7d ce 96 e1 49\n RSP: 0018:ff11000143867528 EFLAGS: 00010246\n RAX: 0000000000000000 RBX: dead000000000122 RCX: 0000000000000000\n RDX: ff11000143691580 RSI: ff110001026e5000 RDI: ff11000106f3d2a0\n RBP: dead000000000100 R08: 00000000000003fd R09: 0000000000000002\n R10: ff11000101c75690 R11: ff1100085faea178 R12: ff11000115f0ae78\n R13: 0000000000000000 R14: ff11000115f0a800 R15: ff11000106f3d2a0\n FS: 00007f35236bf740(0000) GS:ff110008dc809000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 0000000000000008 CR3: 0000000157a01001 CR4: 0000000000373eb0\n Call Trace:\n \u003cTASK\u003e\n mlx5e_tc_del_flow+0x46/0x270 [mlx5_core]\n mlx5e_flow_put+0x25/0x50 [mlx5_core]\n mlx5e_delete_flower+0x2a6/0x3e0 [mlx5_core]\n tc_setup_cb_reoffload+0x20/0x80\n fl_reoffload+0x26f/0x2f0 [cls_flower]\n ? mlx5e_tc_reoffload_flows_work+0xc0/0xc0 [mlx5_core]\n ? mlx5e_tc_reoffload_flows_work+0xc0/0xc0 [mlx5_core]\n tcf_block_playback_offloads+0x9e/0x1c0\n tcf_block_unbind+0x7b/0xd0\n tcf_block_setup+0x186/0x1d0\n tcf_block_offload_cmd.isra.0+0xef/0x130\n tcf_block_offload_unbind+0x43/0x70\n __tcf_block_put+0x85/0x160\n ingress_destroy+0x32/0x110 [sch_ingress]\n __qdisc_destroy+0x44/0x100\n qdisc_graft+0x22b/0x610\n tc_get_qdisc+0x183/0x4d0\n rtnetlink_rcv_msg+0x2d7/0x3d0\n ? rtnl_calcit.isra.0+0x100/0x100\n netlink_rcv_skb+0x53/0x100\n netlink_unicast+0x249/0x320\n ? __alloc_skb+0x102/0x1f0\n netlink_sendmsg+0x1e3/0x420\n __sock_sendmsg+0x38/0x60\n ____sys_sendmsg+0x1ef/0x230\n ? copy_msghdr_from_user+0x6c/0xa0\n ___sys_sendmsg+0x7f/0xc0\n ? ___sys_recvmsg+0x8a/0xc0\n ? __sys_sendto+0x119/0x180\n __sys_sendmsg+0x61/0xb0\n do_syscall_64+0x55/0x640\n entry_SYSCALL_64_after_hwframe+0x4b/0x53\n RIP: 0033:0x7f35238bb764\n Code: 15 b9 86 0c 00 f7 d8 64 89 02 b8 ff ff ff ff eb bf 0f 1f 44 00 00 f3 0f 1e fa 80 3d e5 08 0d 00 00 74 13 b8 2e 00 00 00 0f 05 \u003c48\u003e 3d 00 f0 ff ff 77 4c c3 0f 1f 00 55 48 89 e5 48 83 ec 20 89 55\n RSP: 002b:00007ffed4c35638 EFLAGS: 00000202 ORIG_RAX: 000000000000002e\n RAX: ffffffffffffffda RBX: 000055a2efcc75e0 RCX: 00007f35238bb764\n RDX: 0000000000000000 RSI: 00007ffed4c356a0 RDI: 0000000000000003\n RBP: 00007ffed4c35710 R08: 0000000000000010 R09: 00007f3523984b20\n R10: 0000000000000004 R11: 0000000000000202 R12: 00007ffed4c35790\n R13: 000000006947df8f R14: 000055a2efcc75e0 R15: 00007ffed4c35780",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23173",
"url": "https://www.suse.com/security/cve/CVE-2026-23173"
},
{
"category": "external",
"summary": "SUSE Bug 1258520 for CVE-2026-23173",
"url": "https://bugzilla.suse.com/1258520"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2026-23173"
},
{
"cve": "CVE-2026-23176",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23176"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nplatform/x86: toshiba_haps: Fix memory leaks in add/remove routines\n\ntoshiba_haps_add() leaks the haps object allocated by it if it returns\nan error after allocating that object successfully.\n\ntoshiba_haps_remove() does not free the object pointed to by\ntoshiba_haps before clearing that pointer, so it becomes unreachable\nallocated memory.\n\nAddress these memory leaks by using devm_kzalloc() for allocating\nthe memory in question.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23176",
"url": "https://www.suse.com/security/cve/CVE-2026-23176"
},
{
"category": "external",
"summary": "SUSE Bug 1258256 for CVE-2026-23176",
"url": "https://bugzilla.suse.com/1258256"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2026-23176"
},
{
"cve": "CVE-2026-23178",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23178"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: i2c-hid: fix potential buffer overflow in i2c_hid_get_report()\n\n`i2c_hid_xfer` is used to read `recv_len + sizeof(__le16)` bytes of data\ninto `ihid-\u003erawbuf`.\n\nThe former can come from the userspace in the hidraw driver and is only\nbounded by HID_MAX_BUFFER_SIZE(16384) by default (unless we also set\n`max_buffer_size` field of `struct hid_ll_driver` which we do not).\n\nThe latter has size determined at runtime by the maximum size of\ndifferent report types you could receive on any particular device and\ncan be a much smaller value.\n\nFix this by truncating `recv_len` to `ihid-\u003ebufsize - sizeof(__le16)`.\n\nThe impact is low since access to hidraw devices requires root.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23178",
"url": "https://www.suse.com/security/cve/CVE-2026-23178"
},
{
"category": "external",
"summary": "SUSE Bug 1258358 for CVE-2026-23178",
"url": "https://bugzilla.suse.com/1258358"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2026-23178"
},
{
"cve": "CVE-2026-23179",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23179"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvmet-tcp: fixup hang in nvmet_tcp_listen_data_ready()\n\nWhen the socket is closed while in TCP_LISTEN a callback is run to\nflush all outstanding packets, which in turns calls\nnvmet_tcp_listen_data_ready() with the sk_callback_lock held.\nSo we need to check if we are in TCP_LISTEN before attempting\nto get the sk_callback_lock() to avoid a deadlock.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23179",
"url": "https://www.suse.com/security/cve/CVE-2026-23179"
},
{
"category": "external",
"summary": "SUSE Bug 1258394 for CVE-2026-23179",
"url": "https://bugzilla.suse.com/1258394"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2026-23179"
},
{
"cve": "CVE-2026-23182",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23182"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nspi: tegra: Fix a memory leak in tegra_slink_probe()\n\nIn tegra_slink_probe(), when platform_get_irq() fails, it directly\nreturns from the function with an error code, which causes a memory leak.\n\nReplace it with a goto label to ensure proper cleanup.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23182",
"url": "https://www.suse.com/security/cve/CVE-2026-23182"
},
{
"category": "external",
"summary": "SUSE Bug 1258259 for CVE-2026-23182",
"url": "https://bugzilla.suse.com/1258259"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2026-23182"
},
{
"cve": "CVE-2026-23190",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23190"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: amd: fix memory leak in acp3x pdm dma ops",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23190",
"url": "https://www.suse.com/security/cve/CVE-2026-23190"
},
{
"category": "external",
"summary": "SUSE Bug 1258397 for CVE-2026-23190",
"url": "https://bugzilla.suse.com/1258397"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2026-23190"
},
{
"cve": "CVE-2026-23191",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23191"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: aloop: Fix racy access at PCM trigger\n\nThe PCM trigger callback of aloop driver tries to check the PCM state\nand stop the stream of the tied substream in the corresponding cable.\nSince both check and stop operations are performed outside the cable\nlock, this may result in UAF when a program attempts to trigger\nfrequently while opening/closing the tied stream, as spotted by\nfuzzers.\n\nFor addressing the UAF, this patch changes two things:\n- It covers the most of code in loopback_check_format() with\n cable-\u003elock spinlock, and add the proper NULL checks. This avoids\n already some racy accesses.\n- In addition, now we try to check the state of the capture PCM stream\n that may be stopped in this function, which was the major pain point\n leading to UAF.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23191",
"url": "https://www.suse.com/security/cve/CVE-2026-23191"
},
{
"category": "external",
"summary": "SUSE Bug 1258395 for CVE-2026-23191",
"url": "https://bugzilla.suse.com/1258395"
},
{
"category": "external",
"summary": "SUSE Bug 1258396 for CVE-2026-23191",
"url": "https://bugzilla.suse.com/1258396"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "important"
}
],
"title": "CVE-2026-23191"
},
{
"cve": "CVE-2026-23198",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23198"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: Don\u0027t clobber irqfd routing type when deassigning irqfd\n\nWhen deassigning a KVM_IRQFD, don\u0027t clobber the irqfd\u0027s copy of the IRQ\u0027s\nrouting entry as doing so breaks kvm_arch_irq_bypass_del_producer() on x86\nand arm64, which explicitly look for KVM_IRQ_ROUTING_MSI. Instead, to\nhandle a concurrent routing update, verify that the irqfd is still active\nbefore consuming the routing information. As evidenced by the x86 and\narm64 bugs, and another bug in kvm_arch_update_irqfd_routing() (see below),\nclobbering the entry type without notifying arch code is surprising and\nerror prone.\n\nAs a bonus, checking that the irqfd is active provides a convenient\nlocation for documenting _why_ KVM must not consume the routing entry for\nan irqfd that is in the process of being deassigned: once the irqfd is\ndeleted from the list (which happens *before* the eventfd is detached), it\nwill no longer receive updates via kvm_irq_routing_update(), and so KVM\ncould deliver an event using stale routing information (relative to\nKVM_SET_GSI_ROUTING returning to userspace).\n\nAs an even better bonus, explicitly checking for the irqfd being active\nfixes a similar bug to the one the clobbering is trying to prevent: if an\nirqfd is deactivated, and then its routing is changed,\nkvm_irq_routing_update() won\u0027t invoke kvm_arch_update_irqfd_routing()\n(because the irqfd isn\u0027t in the list). And so if the irqfd is in bypass\nmode, IRQs will continue to be posted using the old routing information.\n\nAs for kvm_arch_irq_bypass_del_producer(), clobbering the routing type\nresults in KVM incorrectly keeping the IRQ in bypass mode, which is\nespecially problematic on AMD as KVM tracks IRQs that are being posted to\na vCPU in a list whose lifetime is tied to the irqfd.\n\nWithout the help of KASAN to detect use-after-free, the most common\nsympton on AMD is a NULL pointer deref in amd_iommu_update_ga() due to\nthe memory for irqfd structure being re-allocated and zeroed, resulting\nin irqfd-\u003eirq_bypass_data being NULL when read by\navic_update_iommu_vcpu_affinity():\n\n BUG: kernel NULL pointer dereference, address: 0000000000000018\n #PF: supervisor read access in kernel mode\n #PF: error_code(0x0000) - not-present page\n PGD 40cf2b9067 P4D 40cf2b9067 PUD 408362a067 PMD 0\n Oops: Oops: 0000 [#1] SMP\n CPU: 6 UID: 0 PID: 40383 Comm: vfio_irq_test\n Tainted: G U W O 6.19.0-smp--5dddc257e6b2-irqfd #31 NONE\n Tainted: [U]=USER, [W]=WARN, [O]=OOT_MODULE\n Hardware name: Google, Inc. Arcadia_IT_80/Arcadia_IT_80, BIOS 34.78.2-0 09/05/2025\n RIP: 0010:amd_iommu_update_ga+0x19/0xe0\n Call Trace:\n \u003cTASK\u003e\n avic_update_iommu_vcpu_affinity+0x3d/0x90 [kvm_amd]\n __avic_vcpu_load+0xf4/0x130 [kvm_amd]\n kvm_arch_vcpu_load+0x89/0x210 [kvm]\n vcpu_load+0x30/0x40 [kvm]\n kvm_arch_vcpu_ioctl_run+0x45/0x620 [kvm]\n kvm_vcpu_ioctl+0x571/0x6a0 [kvm]\n __se_sys_ioctl+0x6d/0xb0\n do_syscall_64+0x6f/0x9d0\n entry_SYSCALL_64_after_hwframe+0x4b/0x53\n RIP: 0033:0x46893b\n \u003c/TASK\u003e\n ---[ end trace 0000000000000000 ]---\n\nIf AVIC is inhibited when the irfd is deassigned, the bug will manifest as\nlist corruption, e.g. on the next irqfd assignment.\n\n list_add corruption. next-\u003eprev should be prev (ffff8d474d5cd588),\n but was 0000000000000000. (next=ffff8d8658f86530).\n ------------[ cut here ]------------\n kernel BUG at lib/list_debug.c:31!\n Oops: invalid opcode: 0000 [#1] SMP\n CPU: 128 UID: 0 PID: 80818 Comm: vfio_irq_test\n Tainted: G U W O 6.19.0-smp--f19dc4d680ba-irqfd #28 NONE\n Tainted: [U]=USER, [W]=WARN, [O]=OOT_MODULE\n Hardware name: Google, Inc. Arcadia_IT_80/Arcadia_IT_80, BIOS 34.78.2-0 09/05/2025\n RIP: 0010:__list_add_valid_or_report+0x97/0xc0\n Call Trace:\n \u003cTASK\u003e\n avic_pi_update_irte+0x28e/0x2b0 [kvm_amd]\n kvm_pi_update_irte+0xbf/0x190 [kvm]\n kvm_arch_irq_bypass_add_producer+0x72/0x90 [kvm]\n irq_bypass_register_consumer+0xcd/0x170 [irqbypa\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23198",
"url": "https://www.suse.com/security/cve/CVE-2026-23198"
},
{
"category": "external",
"summary": "SUSE Bug 1258321 for CVE-2026-23198",
"url": "https://bugzilla.suse.com/1258321"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2026-23198"
},
{
"cve": "CVE-2026-23202",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23202"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nspi: tegra210-quad: Protect curr_xfer in tegra_qspi_combined_seq_xfer\n\nThe curr_xfer field is read by the IRQ handler without holding the lock\nto check if a transfer is in progress. When clearing curr_xfer in the\ncombined sequence transfer loop, protect it with the spinlock to prevent\na race with the interrupt handler.\n\nProtect the curr_xfer clearing at the exit path of\ntegra_qspi_combined_seq_xfer() with the spinlock to prevent a race\nwith the interrupt handler that reads this field.\n\nWithout this protection, the IRQ handler could read a partially updated\ncurr_xfer value, leading to NULL pointer dereference or use-after-free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23202",
"url": "https://www.suse.com/security/cve/CVE-2026-23202"
},
{
"category": "external",
"summary": "SUSE Bug 1258338 for CVE-2026-23202",
"url": "https://bugzilla.suse.com/1258338"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "important"
}
],
"title": "CVE-2026-23202"
},
{
"cve": "CVE-2026-23207",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23207"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nspi: tegra210-quad: Protect curr_xfer check in IRQ handler\n\nNow that all other accesses to curr_xfer are done under the lock,\nprotect the curr_xfer NULL check in tegra_qspi_isr_thread() with the\nspinlock. Without this protection, the following race can occur:\n\n CPU0 (ISR thread) CPU1 (timeout path)\n ---------------- -------------------\n if (!tqspi-\u003ecurr_xfer)\n // sees non-NULL\n spin_lock()\n tqspi-\u003ecurr_xfer = NULL\n spin_unlock()\n handle_*_xfer()\n spin_lock()\n t = tqspi-\u003ecurr_xfer // NULL!\n ... t-\u003elen ... // NULL dereference!\n\nWith this patch, all curr_xfer accesses are now properly synchronized.\n\nAlthough all accesses to curr_xfer are done under the lock, in\ntegra_qspi_isr_thread() it checks for NULL, releases the lock and\nreacquires it later in handle_cpu_based_xfer()/handle_dma_based_xfer().\nThere is a potential for an update in between, which could cause a NULL\npointer dereference.\n\nTo handle this, add a NULL check inside the handlers after acquiring\nthe lock. This ensures that if the timeout path has already cleared\ncurr_xfer, the handler will safely return without dereferencing the\nNULL pointer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23207",
"url": "https://www.suse.com/security/cve/CVE-2026-23207"
},
{
"category": "external",
"summary": "SUSE Bug 1258524 for CVE-2026-23207",
"url": "https://bugzilla.suse.com/1258524"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2026-23207"
},
{
"cve": "CVE-2026-23208",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23208"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: usb-audio: Prevent excessive number of frames\n\nIn this case, the user constructed the parameters with maxpacksize 40\nfor rate 22050 / pps 1000, and packsize[0] 22 packsize[1] 23. The buffer\nsize for each data URB is maxpacksize * packets, which in this example\nis 40 * 6 = 240; When the user performs a write operation to send audio\ndata into the ALSA PCM playback stream, the calculated number of frames\nis packsize[0] * packets = 264, which exceeds the allocated URB buffer\nsize, triggering the out-of-bounds (OOB) issue reported by syzbot [1].\n\nAdded a check for the number of single data URB frames when calculating\nthe number of frames to prevent [1].\n\n[1]\nBUG: KASAN: slab-out-of-bounds in copy_to_urb+0x261/0x460 sound/usb/pcm.c:1487\nWrite of size 264 at addr ffff88804337e800 by task syz.0.17/5506\nCall Trace:\n copy_to_urb+0x261/0x460 sound/usb/pcm.c:1487\n prepare_playback_urb+0x953/0x13d0 sound/usb/pcm.c:1611\n prepare_outbound_urb+0x377/0xc50 sound/usb/endpoint.c:333",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23208",
"url": "https://www.suse.com/security/cve/CVE-2026-23208"
},
{
"category": "external",
"summary": "SUSE Bug 1258468 for CVE-2026-23208",
"url": "https://bugzilla.suse.com/1258468"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2026-23208"
},
{
"cve": "CVE-2026-23209",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23209"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmacvlan: fix error recovery in macvlan_common_newlink()\n\nvalis provided a nice repro to crash the kernel:\n\nip link add p1 type veth peer p2\nip link set address 00:00:00:00:00:20 dev p1\nip link set up dev p1\nip link set up dev p2\n\nip link add mv0 link p2 type macvlan mode source\nip link add invalid% link p2 type macvlan mode source macaddr add 00:00:00:00:00:20\n\nping -c1 -I p1 1.2.3.4\n\nHe also gave a very detailed analysis:\n\n\u003cquote valis\u003e\n\nThe issue is triggered when a new macvlan link is created with\nMACVLAN_MODE_SOURCE mode and MACVLAN_MACADDR_ADD (or\nMACVLAN_MACADDR_SET) parameter, lower device already has a macvlan\nport and register_netdevice() called from macvlan_common_newlink()\nfails (e.g. because of the invalid link name).\n\nIn this case macvlan_hash_add_source is called from\nmacvlan_change_sources() / macvlan_common_newlink():\n\nThis adds a reference to vlan to the port\u0027s vlan_source_hash using\nmacvlan_source_entry.\n\nvlan is a pointer to the priv data of the link that is being created.\n\nWhen register_netdevice() fails, the error is returned from\nmacvlan_newlink() to rtnl_newlink_create():\n\n if (ops-\u003enewlink)\n err = ops-\u003enewlink(dev, \u0026params, extack);\n else\n err = register_netdevice(dev);\n if (err \u003c 0) {\n free_netdev(dev);\n goto out;\n }\n\nand free_netdev() is called, causing a kvfree() on the struct\nnet_device that is still referenced in the source entry attached to\nthe lower device\u0027s macvlan port.\n\nNow all packets sent on the macvlan port with a matching source mac\naddress will trigger a use-after-free in macvlan_forward_source().\n\n\u003c/quote valis\u003e\n\nWith all that, my fix is to make sure we call macvlan_flush_sources()\nregardless of @create value whenever \"goto destroy_macvlan_port;\"\npath is taken.\n\nMany thanks to valis for following up on this issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23209",
"url": "https://www.suse.com/security/cve/CVE-2026-23209"
},
{
"category": "external",
"summary": "SUSE Bug 1258518 for CVE-2026-23209",
"url": "https://bugzilla.suse.com/1258518"
},
{
"category": "external",
"summary": "SUSE Bug 1258784 for CVE-2026-23209",
"url": "https://bugzilla.suse.com/1258784"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "important"
}
],
"title": "CVE-2026-23209"
},
{
"cve": "CVE-2026-23213",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23213"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/pm: Disable MMIO access during SMU Mode 1 reset\n\nDuring Mode 1 reset, the ASIC undergoes a reset cycle and becomes\ntemporarily inaccessible via PCIe. Any attempt to access MMIO registers\nduring this window (e.g., from interrupt handlers or other driver threads)\ncan result in uncompleted PCIe transactions, leading to NMI panics or\nsystem hangs.\n\nTo prevent this, set the `no_hw_access` flag to true immediately after\ntriggering the reset. This signals other driver components to skip\nregister accesses while the device is offline.\n\nA memory barrier `smp_mb()` is added to ensure the flag update is\nglobally visible to all cores before the driver enters the sleep/wait\nstate.\n\n(cherry picked from commit 7edb503fe4b6d67f47d8bb0dfafb8e699bb0f8a4)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23213",
"url": "https://www.suse.com/security/cve/CVE-2026-23213"
},
{
"category": "external",
"summary": "SUSE Bug 1258465 for CVE-2026-23213",
"url": "https://bugzilla.suse.com/1258465"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2026-23213"
},
{
"cve": "CVE-2026-23214",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23214"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: reject new transactions if the fs is fully read-only\n\n[BUG]\nThere is a bug report where a heavily fuzzed fs is mounted with all\nrescue mount options, which leads to the following warnings during\nunmount:\n\n BTRFS: Transaction aborted (error -22)\n Modules linked in:\n CPU: 0 UID: 0 PID: 9758 Comm: repro.out Not tainted\n 6.19.0-rc5-00002-gb71e635feefc #7 PREEMPT(full)\n Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014\n RIP: 0010:find_free_extent_update_loop fs/btrfs/extent-tree.c:4208 [inline]\n RIP: 0010:find_free_extent+0x52f0/0x5d20 fs/btrfs/extent-tree.c:4611\n Call Trace:\n \u003cTASK\u003e\n btrfs_reserve_extent+0x2cd/0x790 fs/btrfs/extent-tree.c:4705\n btrfs_alloc_tree_block+0x1e1/0x10e0 fs/btrfs/extent-tree.c:5157\n btrfs_force_cow_block+0x578/0x2410 fs/btrfs/ctree.c:517\n btrfs_cow_block+0x3c4/0xa80 fs/btrfs/ctree.c:708\n btrfs_search_slot+0xcad/0x2b50 fs/btrfs/ctree.c:2130\n btrfs_truncate_inode_items+0x45d/0x2350 fs/btrfs/inode-item.c:499\n btrfs_evict_inode+0x923/0xe70 fs/btrfs/inode.c:5628\n evict+0x5f4/0xae0 fs/inode.c:837\n __dentry_kill+0x209/0x660 fs/dcache.c:670\n finish_dput+0xc9/0x480 fs/dcache.c:879\n shrink_dcache_for_umount+0xa0/0x170 fs/dcache.c:1661\n generic_shutdown_super+0x67/0x2c0 fs/super.c:621\n kill_anon_super+0x3b/0x70 fs/super.c:1289\n btrfs_kill_super+0x41/0x50 fs/btrfs/super.c:2127\n deactivate_locked_super+0xbc/0x130 fs/super.c:474\n cleanup_mnt+0x425/0x4c0 fs/namespace.c:1318\n task_work_run+0x1d4/0x260 kernel/task_work.c:233\n exit_task_work include/linux/task_work.h:40 [inline]\n do_exit+0x694/0x22f0 kernel/exit.c:971\n do_group_exit+0x21c/0x2d0 kernel/exit.c:1112\n __do_sys_exit_group kernel/exit.c:1123 [inline]\n __se_sys_exit_group kernel/exit.c:1121 [inline]\n __x64_sys_exit_group+0x3f/0x40 kernel/exit.c:1121\n x64_sys_call+0x2210/0x2210 arch/x86/include/generated/asm/syscalls_64.h:232\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xe8/0xf80 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n RIP: 0033:0x44f639\n Code: Unable to access opcode bytes at 0x44f60f.\n RSP: 002b:00007ffc15c4e088 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7\n RAX: ffffffffffffffda RBX: 00000000004c32f0 RCX: 000000000044f639\n RDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000001\n RBP: 0000000000000001 R08: ffffffffffffffc0 R09: 0000000000000000\n R10: 0000000000000000 R11: 0000000000000246 R12: 00000000004c32f0\n R13: 0000000000000001 R14: 0000000000000000 R15: 0000000000000001\n \u003c/TASK\u003e\n\nSince rescue mount options will mark the full fs read-only, there should\nbe no new transaction triggered.\n\nBut during unmount we will evict all inodes, which can trigger a new\ntransaction, and triggers warnings on a heavily corrupted fs.\n\n[CAUSE]\nBtrfs allows new transaction even on a read-only fs, this is to allow\nlog replay happen even on read-only mounts, just like what ext4/xfs do.\n\nHowever with rescue mount options, the fs is fully read-only and cannot\nbe remounted read-write, thus in that case we should also reject any new\ntransactions.\n\n[FIX]\nIf we find the fs has rescue mount options, we should treat the fs as\nerror, so that no new transaction can be started.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23214",
"url": "https://www.suse.com/security/cve/CVE-2026-23214"
},
{
"category": "external",
"summary": "SUSE Bug 1258464 for CVE-2026-23214",
"url": "https://bugzilla.suse.com/1258464"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2026-23214"
},
{
"cve": "CVE-2026-23221",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23221"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbus: fsl-mc: fix use-after-free in driver_override_show()\n\nThe driver_override_show() function reads the driver_override string\nwithout holding the device_lock. However, driver_override_store() uses\ndriver_set_override(), which modifies and frees the string while holding\nthe device_lock.\n\nThis can result in a concurrent use-after-free if the string is freed\nby the store function while being read by the show function.\n\nFix this by holding the device_lock around the read operation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23221",
"url": "https://www.suse.com/security/cve/CVE-2026-23221"
},
{
"category": "external",
"summary": "SUSE Bug 1258660 for CVE-2026-23221",
"url": "https://bugzilla.suse.com/1258660"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2026-23221"
},
{
"cve": "CVE-2026-23222",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23222"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: omap - Allocate OMAP_CRYPTO_FORCE_COPY scatterlists correctly\n\nThe existing allocation of scatterlists in omap_crypto_copy_sg_lists()\nwas allocating an array of scatterlist pointers, not scatterlist objects,\nresulting in a 4x too small allocation.\n\nUse sizeof(*new_sg) to get the correct object size.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23222",
"url": "https://www.suse.com/security/cve/CVE-2026-23222"
},
{
"category": "external",
"summary": "SUSE Bug 1258484 for CVE-2026-23222",
"url": "https://bugzilla.suse.com/1258484"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2026-23222"
},
{
"cve": "CVE-2026-23229",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23229"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: virtio - Add spinlock protection with virtqueue notification\n\nWhen VM boots with one virtio-crypto PCI device and builtin backend,\nrun openssl benchmark command with multiple processes, such as\n openssl speed -evp aes-128-cbc -engine afalg -seconds 10 -multi 32\n\nopenssl processes will hangup and there is error reported like this:\n virtio_crypto virtio0: dataq.0:id 3 is not a head!\n\nIt seems that the data virtqueue need protection when it is handled\nfor virtio done notification. If the spinlock protection is added\nin virtcrypto_done_task(), openssl benchmark with multiple processes\nworks well.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23229",
"url": "https://www.suse.com/security/cve/CVE-2026-23229"
},
{
"category": "external",
"summary": "SUSE Bug 1258429 for CVE-2026-23229",
"url": "https://bugzilla.suse.com/1258429"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T15:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2026-23229"
}
]
}
SUSE-SU-2026:20720-1
Vulnerability from csaf_suse - Published: 2026-03-11 16:03 - Updated: 2026-03-11 16:03| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise Micro 6.0 and Micro 6.1 kernel was updated to fix various security issues\n\nThe following security issues were fixed:\n\n- CVE-2023-53817: crypto: lib/mpi - avoid null pointer deref in mpi_cmp_ui() (bsc#1254992).\n- CVE-2025-37861: scsi: mpi3mr: Synchronous access b/w reset and tm thread for reply queue (bsc#1243055).\n- CVE-2025-39748: bpf: Forget ranges when refining tnum after JSET (bsc#1249587).\n- CVE-2025-39964: crypto: af_alg - Disallow concurrent writes in af_alg_sendmsg (bsc#1251966).\n- CVE-2025-40099: cifs: parse_dfs_referrals: prevent oob on malformed input (bsc#1252911).\n- CVE-2025-40103: smb: client: Fix refcount leak for cifs_sb_tlink (bsc#1252924).\n- CVE-2025-68283: libceph: replace BUG_ON with bounds check for map-\u003emax_osd (bsc#1255379).\n- CVE-2025-68295: smb: client: fix memory leak in cifs_construct_tcon() (bsc#1255129).\n- CVE-2025-68374: md: fix rcu protection in md_wakeup_thread (bsc#1255530).\n- CVE-2025-68736: landlock: Fix handling of disconnected directories (bsc#1255698).\n- CVE-2025-68778: btrfs: don\u0027t log conflicting inode if it\u0027s a dir moved in the current transaction (bsc#1256683).\n- CVE-2025-68785: net: openvswitch: fix middle attribute validation in push_nsh() action (bsc#1256640).\n- CVE-2025-68810: KVM: Disallow toggling KVM_MEM_GUEST_MEMFD on an existing memslot (bsc#1256679).\n- CVE-2025-71071: iommu/mediatek: fix use-after-free on probe deferral (bsc#1256802).\n- CVE-2025-71104: KVM: x86: Fix VM hard lockup after prolonged inactivity with periodic HV timer (bsc#1256708).\n- CVE-2025-71113: crypto: af_alg - zero initialize memory allocated via sock_kmalloc (bsc#1256716).\n- CVE-2025-71126: mptcp: reset fallback status gracefully at disconnect() time (bsc#1256755).\n- CVE-2025-71148: net/handshake: restore destructor on submit failure (bsc#1257159).\n- CVE-2025-71184: btrfs: fix NULL dereference on root when tracing inode eviction (bsc#1257635).\n- CVE-2025-71194: btrfs: fix deadlock in wait_current_trans() due to ignored transaction type (bsc#1257687).\n- CVE-2025-71225: md: suspend array while updating raid_disks via sysfs (bsc#1258411).\n- CVE-2026-22979: net: fix memory leak in skb_segment_list for GRO packets (bsc#1257228).\n- CVE-2026-22982: net: mscc: ocelot: Fix crash when adding interface under a lag (bsc#1257179).\n- CVE-2026-22998: nvme-tcp: fix NULL pointer dereferences in nvmet_tcp_build_pdu_iovec (bsc#1257209).\n- CVE-2026-23003: geneve: Fix incorrect inner network header offset when innerprotoinherit is set (bsc#1257246).\n- CVE-2026-23004: dst: fix races in rt6_uncached_list_del() and rt_del_uncached_list() (bsc#1257231).\n- CVE-2026-23017: idpf: fix error handling in the init_task on load (bsc#1257552).\n- CVE-2026-23035: net/mlx5e: Pass netdev to mlx5e_destroy_netdev instead of priv (bsc#1257559).\n- CVE-2026-23053: NFS: Fix a deadlock involving nfs_release_folio() (bsc#1257718).\n- CVE-2026-23057: vsock/virtio: Coalesce only linear skb (bsc#1257740).\n- CVE-2026-23060: crypto: authencesn - reject too-short AAD (assoclen\u003c8) to match ESP/ESN spec (bsc#1257735).\n- CVE-2026-23064: net/sched: act_ife: avoid possible NULL deref (bsc#1257765).\n- CVE-2026-23074: net/sched: Enforce that teql can only be used as root qdisc (bsc#1257749).\n- CVE-2026-23083: fou: Don\u0027t allow 0 for FOU_ATTR_IPPROTO (bsc#1257745).\n- CVE-2026-23084: be2net: Fix NULL pointer dereference in be_cmd_get_mac_from_list (bsc#1257830).\n- CVE-2026-23085: irqchip/gic-v3-its: Avoid truncating memory addresses (bsc#1257758).\n- CVE-2026-23086: vsock/virtio: cap TX credit to local buffer size (bsc#1257757).\n- CVE-2026-23089: ALSA: usb-audio: Fix use-after-free in snd_usb_mixer_free() (bsc#1257790).\n- CVE-2026-23095: gue: Fix skb memleak with inner IP protocol 0 (bsc#1257808).\n- CVE-2026-23099: bonding: limit BOND_MODE_8023AD to Ethernet devices (bsc#1257816).\n- CVE-2026-23102: arm64/fpsimd: signal: Mandate SVE payload for streaming-mode state (bsc#1257772).\n- CVE-2026-23104: ice: fix devlink reload call trace (bsc#1257763).\n- CVE-2026-23105: net/sched: qfq: Use cl_is_active to determine whether class is active in qfq_rm_from_ag (bsc#1257775).\n- CVE-2026-23107: arm64/fpsimd: signal: Allocate SSVE storage when restoring ZA (bsc#1257762).\n- CVE-2026-23110: scsi: core: Wake up the error handler when final completions race against each other (bsc#1257761).\n- CVE-2026-23111: netfilter: nf_tables: fix inverted genmask check in nft_map_catchall_activate() (bsc#1258181).\n- CVE-2026-23112: nvmet-tcp: add bounds checks in nvmet_tcp_build_pdu_iovec (bsc#1258184).\n- CVE-2026-23113: io_uring/io-wq: check IO_WQ_BIT_EXIT inside work run loop (bsc#1258278).\n- CVE-2026-23116: pmdomain: imx8m-blk-ctrl: Remove separate rst and clk mask for 8mq vpu (bsc#1258277).\n- CVE-2026-23119: bonding: provide a net pointer to __skb_flow_dissect() (bsc#1258273).\n- CVE-2026-23139: netfilter: nf_conncount: update last_gc only when GC has been performed (bsc#1258304).\n- CVE-2026-23141: btrfs: send: check for inline extents in range_is_hole_in_parent() (bsc#1258377).\n- CVE-2026-23166: ice: Fix NULL pointer dereference in ice_vsi_set_napi_queues (bsc#1258272).\n- CVE-2026-23171: net: bonding: update the slave array for broadcast mode (bsc#1258349).\n- CVE-2026-23173: net/mlx5e: TC, delete flows only for existing peers (bsc#1258520).\n- CVE-2026-23179: nvmet-tcp: fixup hang in nvmet_tcp_listen_data_ready() (bsc#1258394).\n- CVE-2026-23191: ALSA: aloop: Fix racy access at PCM trigger (bsc#1258395).\n- CVE-2026-23198: KVM: Don\u0027t clobber irqfd routing type when deassigning irqfd (bsc#1258321).\n- CVE-2026-23208: ALSA: usb-audio: Prevent excessive number of frames (bsc#1258468).\n- CVE-2026-23209: macvlan: fix error recovery in macvlan_common_newlink() (bsc#1258518).\n- CVE-2026-23213: drm/amd/pm: Disable MMIO access during SMU Mode 1 reset (bsc#1258465).\n- CVE-2026-23214: btrfs: reject new transactions if the fs is fully read-only (bsc#1258464).\n\nThe following non security issues were fixed:\n\n- ALSA: usb-audio: Update the number of packets properly at receiving (stable-fixes).\n- ALSA: usb-audio: fix broken logic in snd_audigy2nx_led_update() (git-fixes).\n- ASoC: SOF: ipc4-control: If there is no data do not send bytes update (git-fixes).\n- HID: intel-ish-hid: Update ishtp bus match to support device ID table (stable-fixes).\n- PM: sleep: wakeirq: Update outdated documentation comments (git-fixes).\n- Update \"drm/mgag200: fix mgag200_bmc_stop_scanout()\" bug number (bsc#1258153)\n- Update upstreamed net and powerpc patch references and sorting\n- bonding: only set speed/duplex to unknown, if getting speed failed (bsc#1253691).\n- btrfs: scrub: always update btrfs_scrub_progress::last_physical (git-fixes).\n- clocksource: Print durations for sync check unconditionally (bsc#1241345).\n- clocksource: Reduce watchdog readout delay limit to prevent false positives (bsc#1241345).\n- drm/radeon: delete radeon_fence_process in is_signaled, no deadlock (stable-fixes).\n- ext4: fix iloc.bh leak in ext4_xattr_inode_update_ref (git-fixes).\n- landlock: Optimize file path walks and prepare for audit support (bsc#1255698).\n- media: qcom: camss: vfe: Fix out-of-bounds access in vfe_isr_reg_update() (git-fixes).\n- shrink_slab_memcg: clear_bits of skipped shrinkers (bsc#1256564).\n- spi: tegra210-quad: Move curr_xfer read inside spinlock (bsc#1257952)\n- spi: tegra210-quad: Protect curr_xfer assignment in (bsc#1257952)\n- spi: tegra210-quad: Protect curr_xfer check in IRQ handler (bsc#1257952)\n- spi: tegra210-quad: Protect curr_xfer clearing in (bsc#1257952)\n- spi: tegra210-quad: Protect curr_xfer in tegra_qspi_combined_seq_xfer (bsc#1257952)\n- spi: tegra210-quad: Return IRQ_HANDLED when timeout already processed (bsc#1257952)\n- staging: rtl8723bs: fix missing status update on sdio_alloc_irq() failure (stable-fixes).\n- wifi: cfg80211: Fix use_for flag update on BSS refresh (git-fixes).\n- workqueue: mark power efficient workqueue as unbounded if (bsc#1257891)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-Micro-6.0-kernel-291",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_20720-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:20720-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620720-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:20720-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html"
},
{
"category": "self",
"summary": "SUSE Bug 1241345",
"url": "https://bugzilla.suse.com/1241345"
},
{
"category": "self",
"summary": "SUSE Bug 1243055",
"url": "https://bugzilla.suse.com/1243055"
},
{
"category": "self",
"summary": "SUSE Bug 1249587",
"url": "https://bugzilla.suse.com/1249587"
},
{
"category": "self",
"summary": "SUSE Bug 1251966",
"url": "https://bugzilla.suse.com/1251966"
},
{
"category": "self",
"summary": "SUSE Bug 1252911",
"url": "https://bugzilla.suse.com/1252911"
},
{
"category": "self",
"summary": "SUSE Bug 1252924",
"url": "https://bugzilla.suse.com/1252924"
},
{
"category": "self",
"summary": "SUSE Bug 1253691",
"url": "https://bugzilla.suse.com/1253691"
},
{
"category": "self",
"summary": "SUSE Bug 1254992",
"url": "https://bugzilla.suse.com/1254992"
},
{
"category": "self",
"summary": "SUSE Bug 1255129",
"url": "https://bugzilla.suse.com/1255129"
},
{
"category": "self",
"summary": "SUSE Bug 1255265",
"url": "https://bugzilla.suse.com/1255265"
},
{
"category": "self",
"summary": "SUSE Bug 1255379",
"url": "https://bugzilla.suse.com/1255379"
},
{
"category": "self",
"summary": "SUSE Bug 1255530",
"url": "https://bugzilla.suse.com/1255530"
},
{
"category": "self",
"summary": "SUSE Bug 1255698",
"url": "https://bugzilla.suse.com/1255698"
},
{
"category": "self",
"summary": "SUSE Bug 1256564",
"url": "https://bugzilla.suse.com/1256564"
},
{
"category": "self",
"summary": "SUSE Bug 1256640",
"url": "https://bugzilla.suse.com/1256640"
},
{
"category": "self",
"summary": "SUSE Bug 1256679",
"url": "https://bugzilla.suse.com/1256679"
},
{
"category": "self",
"summary": "SUSE Bug 1256683",
"url": "https://bugzilla.suse.com/1256683"
},
{
"category": "self",
"summary": "SUSE Bug 1256708",
"url": "https://bugzilla.suse.com/1256708"
},
{
"category": "self",
"summary": "SUSE Bug 1256716",
"url": "https://bugzilla.suse.com/1256716"
},
{
"category": "self",
"summary": "SUSE Bug 1256755",
"url": "https://bugzilla.suse.com/1256755"
},
{
"category": "self",
"summary": "SUSE Bug 1256802",
"url": "https://bugzilla.suse.com/1256802"
},
{
"category": "self",
"summary": "SUSE Bug 1256863",
"url": "https://bugzilla.suse.com/1256863"
},
{
"category": "self",
"summary": "SUSE Bug 1257159",
"url": "https://bugzilla.suse.com/1257159"
},
{
"category": "self",
"summary": "SUSE Bug 1257179",
"url": "https://bugzilla.suse.com/1257179"
},
{
"category": "self",
"summary": "SUSE Bug 1257209",
"url": "https://bugzilla.suse.com/1257209"
},
{
"category": "self",
"summary": "SUSE Bug 1257228",
"url": "https://bugzilla.suse.com/1257228"
},
{
"category": "self",
"summary": "SUSE Bug 1257231",
"url": "https://bugzilla.suse.com/1257231"
},
{
"category": "self",
"summary": "SUSE Bug 1257246",
"url": "https://bugzilla.suse.com/1257246"
},
{
"category": "self",
"summary": "SUSE Bug 1257552",
"url": "https://bugzilla.suse.com/1257552"
},
{
"category": "self",
"summary": "SUSE Bug 1257554",
"url": "https://bugzilla.suse.com/1257554"
},
{
"category": "self",
"summary": "SUSE Bug 1257557",
"url": "https://bugzilla.suse.com/1257557"
},
{
"category": "self",
"summary": "SUSE Bug 1257559",
"url": "https://bugzilla.suse.com/1257559"
},
{
"category": "self",
"summary": "SUSE Bug 1257560",
"url": "https://bugzilla.suse.com/1257560"
},
{
"category": "self",
"summary": "SUSE Bug 1257562",
"url": "https://bugzilla.suse.com/1257562"
},
{
"category": "self",
"summary": "SUSE Bug 1257570",
"url": "https://bugzilla.suse.com/1257570"
},
{
"category": "self",
"summary": "SUSE Bug 1257573",
"url": "https://bugzilla.suse.com/1257573"
},
{
"category": "self",
"summary": "SUSE Bug 1257576",
"url": "https://bugzilla.suse.com/1257576"
},
{
"category": "self",
"summary": "SUSE Bug 1257579",
"url": "https://bugzilla.suse.com/1257579"
},
{
"category": "self",
"summary": "SUSE Bug 1257580",
"url": "https://bugzilla.suse.com/1257580"
},
{
"category": "self",
"summary": "SUSE Bug 1257586",
"url": "https://bugzilla.suse.com/1257586"
},
{
"category": "self",
"summary": "SUSE Bug 1257635",
"url": "https://bugzilla.suse.com/1257635"
},
{
"category": "self",
"summary": "SUSE Bug 1257679",
"url": "https://bugzilla.suse.com/1257679"
},
{
"category": "self",
"summary": "SUSE Bug 1257687",
"url": "https://bugzilla.suse.com/1257687"
},
{
"category": "self",
"summary": "SUSE Bug 1257704",
"url": "https://bugzilla.suse.com/1257704"
},
{
"category": "self",
"summary": "SUSE Bug 1257706",
"url": "https://bugzilla.suse.com/1257706"
},
{
"category": "self",
"summary": "SUSE Bug 1257707",
"url": "https://bugzilla.suse.com/1257707"
},
{
"category": "self",
"summary": "SUSE Bug 1257714",
"url": "https://bugzilla.suse.com/1257714"
},
{
"category": "self",
"summary": "SUSE Bug 1257715",
"url": "https://bugzilla.suse.com/1257715"
},
{
"category": "self",
"summary": "SUSE Bug 1257716",
"url": "https://bugzilla.suse.com/1257716"
},
{
"category": "self",
"summary": "SUSE Bug 1257718",
"url": "https://bugzilla.suse.com/1257718"
},
{
"category": "self",
"summary": "SUSE Bug 1257722",
"url": "https://bugzilla.suse.com/1257722"
},
{
"category": "self",
"summary": "SUSE Bug 1257723",
"url": "https://bugzilla.suse.com/1257723"
},
{
"category": "self",
"summary": "SUSE Bug 1257729",
"url": "https://bugzilla.suse.com/1257729"
},
{
"category": "self",
"summary": "SUSE Bug 1257735",
"url": "https://bugzilla.suse.com/1257735"
},
{
"category": "self",
"summary": "SUSE Bug 1257739",
"url": "https://bugzilla.suse.com/1257739"
},
{
"category": "self",
"summary": "SUSE Bug 1257740",
"url": "https://bugzilla.suse.com/1257740"
},
{
"category": "self",
"summary": "SUSE Bug 1257741",
"url": "https://bugzilla.suse.com/1257741"
},
{
"category": "self",
"summary": "SUSE Bug 1257743",
"url": "https://bugzilla.suse.com/1257743"
},
{
"category": "self",
"summary": "SUSE Bug 1257745",
"url": "https://bugzilla.suse.com/1257745"
},
{
"category": "self",
"summary": "SUSE Bug 1257749",
"url": "https://bugzilla.suse.com/1257749"
},
{
"category": "self",
"summary": "SUSE Bug 1257750",
"url": "https://bugzilla.suse.com/1257750"
},
{
"category": "self",
"summary": "SUSE Bug 1257757",
"url": "https://bugzilla.suse.com/1257757"
},
{
"category": "self",
"summary": "SUSE Bug 1257758",
"url": "https://bugzilla.suse.com/1257758"
},
{
"category": "self",
"summary": "SUSE Bug 1257759",
"url": "https://bugzilla.suse.com/1257759"
},
{
"category": "self",
"summary": "SUSE Bug 1257761",
"url": "https://bugzilla.suse.com/1257761"
},
{
"category": "self",
"summary": "SUSE Bug 1257762",
"url": "https://bugzilla.suse.com/1257762"
},
{
"category": "self",
"summary": "SUSE Bug 1257763",
"url": "https://bugzilla.suse.com/1257763"
},
{
"category": "self",
"summary": "SUSE Bug 1257765",
"url": "https://bugzilla.suse.com/1257765"
},
{
"category": "self",
"summary": "SUSE Bug 1257768",
"url": "https://bugzilla.suse.com/1257768"
},
{
"category": "self",
"summary": "SUSE Bug 1257770",
"url": "https://bugzilla.suse.com/1257770"
},
{
"category": "self",
"summary": "SUSE Bug 1257772",
"url": "https://bugzilla.suse.com/1257772"
},
{
"category": "self",
"summary": "SUSE Bug 1257775",
"url": "https://bugzilla.suse.com/1257775"
},
{
"category": "self",
"summary": "SUSE Bug 1257776",
"url": "https://bugzilla.suse.com/1257776"
},
{
"category": "self",
"summary": "SUSE Bug 1257788",
"url": "https://bugzilla.suse.com/1257788"
},
{
"category": "self",
"summary": "SUSE Bug 1257789",
"url": "https://bugzilla.suse.com/1257789"
},
{
"category": "self",
"summary": "SUSE Bug 1257790",
"url": "https://bugzilla.suse.com/1257790"
},
{
"category": "self",
"summary": "SUSE Bug 1257805",
"url": "https://bugzilla.suse.com/1257805"
},
{
"category": "self",
"summary": "SUSE Bug 1257808",
"url": "https://bugzilla.suse.com/1257808"
},
{
"category": "self",
"summary": "SUSE Bug 1257809",
"url": "https://bugzilla.suse.com/1257809"
},
{
"category": "self",
"summary": "SUSE Bug 1257811",
"url": "https://bugzilla.suse.com/1257811"
},
{
"category": "self",
"summary": "SUSE Bug 1257813",
"url": "https://bugzilla.suse.com/1257813"
},
{
"category": "self",
"summary": "SUSE Bug 1257816",
"url": "https://bugzilla.suse.com/1257816"
},
{
"category": "self",
"summary": "SUSE Bug 1257830",
"url": "https://bugzilla.suse.com/1257830"
},
{
"category": "self",
"summary": "SUSE Bug 1257891",
"url": "https://bugzilla.suse.com/1257891"
},
{
"category": "self",
"summary": "SUSE Bug 1257942",
"url": "https://bugzilla.suse.com/1257942"
},
{
"category": "self",
"summary": "SUSE Bug 1257952",
"url": "https://bugzilla.suse.com/1257952"
},
{
"category": "self",
"summary": "SUSE Bug 1258153",
"url": "https://bugzilla.suse.com/1258153"
},
{
"category": "self",
"summary": "SUSE Bug 1258181",
"url": "https://bugzilla.suse.com/1258181"
},
{
"category": "self",
"summary": "SUSE Bug 1258184",
"url": "https://bugzilla.suse.com/1258184"
},
{
"category": "self",
"summary": "SUSE Bug 1258222",
"url": "https://bugzilla.suse.com/1258222"
},
{
"category": "self",
"summary": "SUSE Bug 1258234",
"url": "https://bugzilla.suse.com/1258234"
},
{
"category": "self",
"summary": "SUSE Bug 1258237",
"url": "https://bugzilla.suse.com/1258237"
},
{
"category": "self",
"summary": "SUSE Bug 1258245",
"url": "https://bugzilla.suse.com/1258245"
},
{
"category": "self",
"summary": "SUSE Bug 1258249",
"url": "https://bugzilla.suse.com/1258249"
},
{
"category": "self",
"summary": "SUSE Bug 1258252",
"url": "https://bugzilla.suse.com/1258252"
},
{
"category": "self",
"summary": "SUSE Bug 1258256",
"url": "https://bugzilla.suse.com/1258256"
},
{
"category": "self",
"summary": "SUSE Bug 1258259",
"url": "https://bugzilla.suse.com/1258259"
},
{
"category": "self",
"summary": "SUSE Bug 1258272",
"url": "https://bugzilla.suse.com/1258272"
},
{
"category": "self",
"summary": "SUSE Bug 1258273",
"url": "https://bugzilla.suse.com/1258273"
},
{
"category": "self",
"summary": "SUSE Bug 1258277",
"url": "https://bugzilla.suse.com/1258277"
},
{
"category": "self",
"summary": "SUSE Bug 1258278",
"url": "https://bugzilla.suse.com/1258278"
},
{
"category": "self",
"summary": "SUSE Bug 1258279",
"url": "https://bugzilla.suse.com/1258279"
},
{
"category": "self",
"summary": "SUSE Bug 1258299",
"url": "https://bugzilla.suse.com/1258299"
},
{
"category": "self",
"summary": "SUSE Bug 1258304",
"url": "https://bugzilla.suse.com/1258304"
},
{
"category": "self",
"summary": "SUSE Bug 1258309",
"url": "https://bugzilla.suse.com/1258309"
},
{
"category": "self",
"summary": "SUSE Bug 1258313",
"url": "https://bugzilla.suse.com/1258313"
},
{
"category": "self",
"summary": "SUSE Bug 1258317",
"url": "https://bugzilla.suse.com/1258317"
},
{
"category": "self",
"summary": "SUSE Bug 1258321",
"url": "https://bugzilla.suse.com/1258321"
},
{
"category": "self",
"summary": "SUSE Bug 1258326",
"url": "https://bugzilla.suse.com/1258326"
},
{
"category": "self",
"summary": "SUSE Bug 1258338",
"url": "https://bugzilla.suse.com/1258338"
},
{
"category": "self",
"summary": "SUSE Bug 1258349",
"url": "https://bugzilla.suse.com/1258349"
},
{
"category": "self",
"summary": "SUSE Bug 1258354",
"url": "https://bugzilla.suse.com/1258354"
},
{
"category": "self",
"summary": "SUSE Bug 1258358",
"url": "https://bugzilla.suse.com/1258358"
},
{
"category": "self",
"summary": "SUSE Bug 1258374",
"url": "https://bugzilla.suse.com/1258374"
},
{
"category": "self",
"summary": "SUSE Bug 1258377",
"url": "https://bugzilla.suse.com/1258377"
},
{
"category": "self",
"summary": "SUSE Bug 1258379",
"url": "https://bugzilla.suse.com/1258379"
},
{
"category": "self",
"summary": "SUSE Bug 1258394",
"url": "https://bugzilla.suse.com/1258394"
},
{
"category": "self",
"summary": "SUSE Bug 1258395",
"url": "https://bugzilla.suse.com/1258395"
},
{
"category": "self",
"summary": "SUSE Bug 1258397",
"url": "https://bugzilla.suse.com/1258397"
},
{
"category": "self",
"summary": "SUSE Bug 1258411",
"url": "https://bugzilla.suse.com/1258411"
},
{
"category": "self",
"summary": "SUSE Bug 1258415",
"url": "https://bugzilla.suse.com/1258415"
},
{
"category": "self",
"summary": "SUSE Bug 1258419",
"url": "https://bugzilla.suse.com/1258419"
},
{
"category": "self",
"summary": "SUSE Bug 1258422",
"url": "https://bugzilla.suse.com/1258422"
},
{
"category": "self",
"summary": "SUSE Bug 1258424",
"url": "https://bugzilla.suse.com/1258424"
},
{
"category": "self",
"summary": "SUSE Bug 1258429",
"url": "https://bugzilla.suse.com/1258429"
},
{
"category": "self",
"summary": "SUSE Bug 1258442",
"url": "https://bugzilla.suse.com/1258442"
},
{
"category": "self",
"summary": "SUSE Bug 1258464",
"url": "https://bugzilla.suse.com/1258464"
},
{
"category": "self",
"summary": "SUSE Bug 1258465",
"url": "https://bugzilla.suse.com/1258465"
},
{
"category": "self",
"summary": "SUSE Bug 1258468",
"url": "https://bugzilla.suse.com/1258468"
},
{
"category": "self",
"summary": "SUSE Bug 1258469",
"url": "https://bugzilla.suse.com/1258469"
},
{
"category": "self",
"summary": "SUSE Bug 1258484",
"url": "https://bugzilla.suse.com/1258484"
},
{
"category": "self",
"summary": "SUSE Bug 1258518",
"url": "https://bugzilla.suse.com/1258518"
},
{
"category": "self",
"summary": "SUSE Bug 1258519",
"url": "https://bugzilla.suse.com/1258519"
},
{
"category": "self",
"summary": "SUSE Bug 1258520",
"url": "https://bugzilla.suse.com/1258520"
},
{
"category": "self",
"summary": "SUSE Bug 1258524",
"url": "https://bugzilla.suse.com/1258524"
},
{
"category": "self",
"summary": "SUSE Bug 1258544",
"url": "https://bugzilla.suse.com/1258544"
},
{
"category": "self",
"summary": "SUSE Bug 1258660",
"url": "https://bugzilla.suse.com/1258660"
},
{
"category": "self",
"summary": "SUSE Bug 1258824",
"url": "https://bugzilla.suse.com/1258824"
},
{
"category": "self",
"summary": "SUSE Bug 1258928",
"url": "https://bugzilla.suse.com/1258928"
},
{
"category": "self",
"summary": "SUSE Bug 1259070",
"url": "https://bugzilla.suse.com/1259070"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53817 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53817/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-37861 page",
"url": "https://www.suse.com/security/cve/CVE-2025-37861/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39748 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39748/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39964 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39964/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40099 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40099/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40103 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40103/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68283 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68283/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68295 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68295/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68374 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68374/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68736 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68736/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68778 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68778/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68785 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68785/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68810 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68810/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71071 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71071/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71104 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71104/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71113 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71113/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71126 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71126/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71148 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71148/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71182 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71182/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71184 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71184/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71185 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71185/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71188 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71188/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71189 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71189/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71190 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71190/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71191 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71191/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71192 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71192/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71194 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71194/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71195 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71195/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71196 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71196/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71197 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71197/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71198 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71198/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71199 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71199/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71200 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71200/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71222 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71222/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71224 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71224/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71225 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71225/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71229 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71229/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71231 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71231/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71232 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71232/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71234 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71234/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71235 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71235/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71236 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71236/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-22979 page",
"url": "https://www.suse.com/security/cve/CVE-2026-22979/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-22982 page",
"url": "https://www.suse.com/security/cve/CVE-2026-22982/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-22998 page",
"url": "https://www.suse.com/security/cve/CVE-2026-22998/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23003 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23003/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23004 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23004/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23017 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23017/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23021 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23021/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23026 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23026/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23033 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23033/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23035 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23035/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23037 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23037/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23049 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23049/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23053 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23053/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23056 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23056/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23057 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23057/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23058 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23058/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23060 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23060/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23061 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23061/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23063 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23063/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23064 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23064/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23068 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23068/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23071 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23071/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23073 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23073/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23074 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23074/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23076 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23076/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23078 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23078/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23080 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23080/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23082 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23082/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23083 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23083/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23084 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23084/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23085 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23085/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23086 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23086/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23089 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23089/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23090 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23090/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23091 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23091/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23094 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23094/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23095 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23095/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23096 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23096/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23099 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23099/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23101 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23101/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23102 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23102/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23104 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23104/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23105 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23105/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23107 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23107/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23108 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23108/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23110 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23110/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23111 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23111/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23112 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23112/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23113 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23113/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23116 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23116/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23119 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23119/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23121 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23121/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23129 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23129/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23133 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23133/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23135 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23135/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23139 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23141 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23145 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23145/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23146 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23146/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23150 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23150/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23151 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23151/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23152 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23152/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23155 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23155/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23156 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23156/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23163 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23163/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23166 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23166/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23167 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23167/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23170 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23170/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23171 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23171/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23172 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23172/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23173 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23173/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23176 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23176/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23178 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23178/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23179 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23179/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23182 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23182/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23190 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23190/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23191 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23191/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23198 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23198/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23202 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23202/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23207 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23207/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23208 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23208/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23209 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23209/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23213 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23213/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23214 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23214/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23221 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23221/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23222 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23222/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23229 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23229/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2026-03-11T16:03:14Z",
"generator": {
"date": "2026-03-11T16:03:14Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:20720-1",
"initial_release_date": "2026-03-11T16:03:14Z",
"revision_history": [
{
"date": "2026-03-11T16:03:14Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-6.4.0-40.1.aarch64",
"product": {
"name": "kernel-default-6.4.0-40.1.aarch64",
"product_id": "kernel-default-6.4.0-40.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-6.4.0-40.1.21.17.aarch64",
"product": {
"name": "kernel-default-base-6.4.0-40.1.21.17.aarch64",
"product_id": "kernel-default-base-6.4.0-40.1.21.17.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-6.4.0-40.1.noarch",
"product": {
"name": "kernel-devel-6.4.0-40.1.noarch",
"product_id": "kernel-devel-6.4.0-40.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-6.4.0-40.1.noarch",
"product": {
"name": "kernel-macros-6.4.0-40.1.noarch",
"product_id": "kernel-macros-6.4.0-40.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-6.4.0-40.1.noarch",
"product": {
"name": "kernel-source-6.4.0-40.1.noarch",
"product_id": "kernel-source-6.4.0-40.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-6.4.0-40.1.s390x",
"product": {
"name": "kernel-default-6.4.0-40.1.s390x",
"product_id": "kernel-default-6.4.0-40.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-6.4.0-40.1.s390x",
"product": {
"name": "kernel-default-livepatch-6.4.0-40.1.s390x",
"product_id": "kernel-default-livepatch-6.4.0-40.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-6.4.0-40.1.x86_64",
"product": {
"name": "kernel-default-6.4.0-40.1.x86_64",
"product_id": "kernel-default-6.4.0-40.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-6.4.0-40.1.21.17.x86_64",
"product": {
"name": "kernel-default-base-6.4.0-40.1.21.17.x86_64",
"product_id": "kernel-default-base-6.4.0-40.1.21.17.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-6.4.0-40.1.x86_64",
"product": {
"name": "kernel-default-livepatch-6.4.0-40.1.x86_64",
"product_id": "kernel-default-livepatch-6.4.0-40.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-6.4.0-40.1.x86_64",
"product": {
"name": "kernel-kvmsmall-6.4.0-40.1.x86_64",
"product_id": "kernel-kvmsmall-6.4.0-40.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Micro 6.0",
"product": {
"name": "SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sl-micro:6.0"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.4.0-40.1.aarch64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64"
},
"product_reference": "kernel-default-6.4.0-40.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.4.0-40.1.s390x as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x"
},
"product_reference": "kernel-default-6.4.0-40.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.4.0-40.1.x86_64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64"
},
"product_reference": "kernel-default-6.4.0-40.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.4.0-40.1.21.17.aarch64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64"
},
"product_reference": "kernel-default-base-6.4.0-40.1.21.17.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.4.0-40.1.21.17.x86_64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64"
},
"product_reference": "kernel-default-base-6.4.0-40.1.21.17.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-6.4.0-40.1.s390x as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x"
},
"product_reference": "kernel-default-livepatch-6.4.0-40.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-6.4.0-40.1.x86_64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64"
},
"product_reference": "kernel-default-livepatch-6.4.0-40.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-6.4.0-40.1.noarch as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch"
},
"product_reference": "kernel-devel-6.4.0-40.1.noarch",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-6.4.0-40.1.x86_64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64"
},
"product_reference": "kernel-kvmsmall-6.4.0-40.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-6.4.0-40.1.noarch as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch"
},
"product_reference": "kernel-macros-6.4.0-40.1.noarch",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-6.4.0-40.1.noarch as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
},
"product_reference": "kernel-source-6.4.0-40.1.noarch",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-53817",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53817"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: lib/mpi - avoid null pointer deref in mpi_cmp_ui()\n\nDuring NVMeTCP Authentication a controller can trigger a kernel\noops by specifying the 8192 bit Diffie Hellman group and passing\na correctly sized, but zeroed Diffie Hellamn value.\nmpi_cmp_ui() was detecting this if the second parameter was 0,\nbut 1 is passed from dh_is_pubkey_valid(). This causes the null\npointer u-\u003ed to be dereferenced towards the end of mpi_cmp_ui()",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53817",
"url": "https://www.suse.com/security/cve/CVE-2023-53817"
},
{
"category": "external",
"summary": "SUSE Bug 1254992 for CVE-2023-53817",
"url": "https://bugzilla.suse.com/1254992"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-53817"
},
{
"cve": "CVE-2025-37861",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-37861"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mpi3mr: Synchronous access b/w reset and tm thread for reply queue\n\nWhen the task management thread processes reply queues while the reset\nthread resets them, the task management thread accesses an invalid queue ID\n(0xFFFF), set by the reset thread, which points to unallocated memory,\ncausing a crash.\n\nAdd flag \u0027io_admin_reset_sync\u0027 to synchronize access between the reset,\nI/O, and admin threads. Before a reset, the reset handler sets this flag to\nblock I/O and admin processing threads. If any thread bypasses the initial\ncheck, the reset thread waits up to 10 seconds for processing to finish. If\nthe wait exceeds 10 seconds, the controller is marked as unrecoverable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-37861",
"url": "https://www.suse.com/security/cve/CVE-2025-37861"
},
{
"category": "external",
"summary": "SUSE Bug 1243055 for CVE-2025-37861",
"url": "https://bugzilla.suse.com/1243055"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-37861"
},
{
"cve": "CVE-2025-39748",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39748"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Forget ranges when refining tnum after JSET\n\nSyzbot reported a kernel warning due to a range invariant violation on\nthe following BPF program.\n\n 0: call bpf_get_netns_cookie\n 1: if r0 == 0 goto \u003cexit\u003e\n 2: if r0 \u0026 Oxffffffff goto \u003cexit\u003e\n\nThe issue is on the path where we fall through both jumps.\n\nThat path is unreachable at runtime: after insn 1, we know r0 != 0, but\nwith the sign extension on the jset, we would only fallthrough insn 2\nif r0 == 0. Unfortunately, is_branch_taken() isn\u0027t currently able to\nfigure this out, so the verifier walks all branches. The verifier then\nrefines the register bounds using the second condition and we end\nup with inconsistent bounds on this unreachable path:\n\n 1: if r0 == 0 goto \u003cexit\u003e\n r0: u64=[0x1, 0xffffffffffffffff] var_off=(0, 0xffffffffffffffff)\n 2: if r0 \u0026 0xffffffff goto \u003cexit\u003e\n r0 before reg_bounds_sync: u64=[0x1, 0xffffffffffffffff] var_off=(0, 0)\n r0 after reg_bounds_sync: u64=[0x1, 0] var_off=(0, 0)\n\nImproving the range refinement for JSET to cover all cases is tricky. We\nalso don\u0027t expect many users to rely on JSET given LLVM doesn\u0027t generate\nthose instructions. So instead of improving the range refinement for\nJSETs, Eduard suggested we forget the ranges whenever we\u0027re narrowing\ntnums after a JSET. This patch implements that approach.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39748",
"url": "https://www.suse.com/security/cve/CVE-2025-39748"
},
{
"category": "external",
"summary": "SUSE Bug 1249587 for CVE-2025-39748",
"url": "https://bugzilla.suse.com/1249587"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-39748"
},
{
"cve": "CVE-2025-39964",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39964"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: af_alg - Disallow concurrent writes in af_alg_sendmsg\n\nIssuing two writes to the same af_alg socket is bogus as the\ndata will be interleaved in an unpredictable fashion. Furthermore,\nconcurrent writes may create inconsistencies in the internal\nsocket state.\n\nDisallow this by adding a new ctx-\u003ewrite field that indiciates\nexclusive ownership for writing.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39964",
"url": "https://www.suse.com/security/cve/CVE-2025-39964"
},
{
"category": "external",
"summary": "SUSE Bug 1251966 for CVE-2025-39964",
"url": "https://bugzilla.suse.com/1251966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-39964"
},
{
"cve": "CVE-2025-40099",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40099"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncifs: parse_dfs_referrals: prevent oob on malformed input\n\nMalicious SMB server can send invalid reply to FSCTL_DFS_GET_REFERRALS\n\n- reply smaller than sizeof(struct get_dfs_referral_rsp)\n- reply with number of referrals smaller than NumberOfReferrals in the\nheader\n\nProcessing of such replies will cause oob.\n\nReturn -EINVAL error on such replies to prevent oob-s.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40099",
"url": "https://www.suse.com/security/cve/CVE-2025-40099"
},
{
"category": "external",
"summary": "SUSE Bug 1252911 for CVE-2025-40099",
"url": "https://bugzilla.suse.com/1252911"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-40099"
},
{
"cve": "CVE-2025-40103",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40103"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: Fix refcount leak for cifs_sb_tlink\n\nFix three refcount inconsistency issues related to `cifs_sb_tlink`.\n\nComments for `cifs_sb_tlink` state that `cifs_put_tlink()` needs to be\ncalled after successful calls to `cifs_sb_tlink()`. Three calls fail to\nupdate refcount accordingly, leading to possible resource leaks.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40103",
"url": "https://www.suse.com/security/cve/CVE-2025-40103"
},
{
"category": "external",
"summary": "SUSE Bug 1252924 for CVE-2025-40103",
"url": "https://bugzilla.suse.com/1252924"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "low"
}
],
"title": "CVE-2025-40103"
},
{
"cve": "CVE-2025-68283",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68283"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nlibceph: replace BUG_ON with bounds check for map-\u003emax_osd\n\nOSD indexes come from untrusted network packets. Boundary checks are\nadded to validate these against map-\u003emax_osd.\n\n[ idryomov: drop BUG_ON in ceph_get_primary_affinity(), minor cosmetic\n edits ]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68283",
"url": "https://www.suse.com/security/cve/CVE-2025-68283"
},
{
"category": "external",
"summary": "SUSE Bug 1255379 for CVE-2025-68283",
"url": "https://bugzilla.suse.com/1255379"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-68283"
},
{
"cve": "CVE-2025-68295",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68295"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: fix memory leak in cifs_construct_tcon()\n\nWhen having a multiuser mount with domain= specified and using\ncifscreds, cifs_set_cifscreds() will end up setting @ctx-\u003edomainname,\nso it needs to be freed before leaving cifs_construct_tcon().\n\nThis fixes the following memory leak reported by kmemleak:\n\n mount.cifs //srv/share /mnt -o domain=ZELDA,multiuser,...\n su - testuser\n cifscreds add -d ZELDA -u testuser\n ...\n ls /mnt/1\n ...\n umount /mnt\n echo scan \u003e /sys/kernel/debug/kmemleak\n cat /sys/kernel/debug/kmemleak\n unreferenced object 0xffff8881203c3f08 (size 8):\n comm \"ls\", pid 5060, jiffies 4307222943\n hex dump (first 8 bytes):\n 5a 45 4c 44 41 00 cc cc ZELDA...\n backtrace (crc d109a8cf):\n __kmalloc_node_track_caller_noprof+0x572/0x710\n kstrdup+0x3a/0x70\n cifs_sb_tlink+0x1209/0x1770 [cifs]\n cifs_get_fattr+0xe1/0xf50 [cifs]\n cifs_get_inode_info+0xb5/0x240 [cifs]\n cifs_revalidate_dentry_attr+0x2d1/0x470 [cifs]\n cifs_getattr+0x28e/0x450 [cifs]\n vfs_getattr_nosec+0x126/0x180\n vfs_statx+0xf6/0x220\n do_statx+0xab/0x110\n __x64_sys_statx+0xd5/0x130\n do_syscall_64+0xbb/0x380\n entry_SYSCALL_64_after_hwframe+0x77/0x7f",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68295",
"url": "https://www.suse.com/security/cve/CVE-2025-68295"
},
{
"category": "external",
"summary": "SUSE Bug 1255129 for CVE-2025-68295",
"url": "https://bugzilla.suse.com/1255129"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-68295"
},
{
"cve": "CVE-2025-68374",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68374"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmd: fix rcu protection in md_wakeup_thread\n\nWe attempted to use RCU to protect the pointer \u0027thread\u0027, but directly\npassed the value when calling md_wakeup_thread(). This means that the\nRCU pointer has been acquired before rcu_read_lock(), which renders\nrcu_read_lock() ineffective and could lead to a use-after-free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68374",
"url": "https://www.suse.com/security/cve/CVE-2025-68374"
},
{
"category": "external",
"summary": "SUSE Bug 1255530 for CVE-2025-68374",
"url": "https://bugzilla.suse.com/1255530"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-68374"
},
{
"cve": "CVE-2025-68736",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68736"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nlandlock: Fix handling of disconnected directories\n\nDisconnected files or directories can appear when they are visible and\nopened from a bind mount, but have been renamed or moved from the source\nof the bind mount in a way that makes them inaccessible from the mount\npoint (i.e. out of scope).\n\nPreviously, access rights tied to files or directories opened through a\ndisconnected directory were collected by walking the related hierarchy\ndown to the root of the filesystem, without taking into account the\nmount point because it couldn\u0027t be found. This could lead to\ninconsistent access results, potential access right widening, and\nhard-to-debug renames, especially since such paths cannot be printed.\n\nFor a sandboxed task to create a disconnected directory, it needs to\nhave write access (i.e. FS_MAKE_REG, FS_REMOVE_FILE, and FS_REFER) to\nthe underlying source of the bind mount, and read access to the related\nmount point. Because a sandboxed task cannot acquire more access\nrights than those defined by its Landlock domain, this could lead to\ninconsistent access rights due to missing permissions that should be\ninherited from the mount point hierarchy, while inheriting permissions\nfrom the filesystem hierarchy hidden by this mount point instead.\n\nLandlock now handles files and directories opened from disconnected\ndirectories by taking into account the filesystem hierarchy when the\nmount point is not found in the hierarchy walk, and also always taking\ninto account the mount point from which these disconnected directories\nwere opened. This ensures that a rename is not allowed if it would\nwiden access rights [1].\n\nThe rationale is that, even if disconnected hierarchies might not be\nvisible or accessible to a sandboxed task, relying on the collected\naccess rights from them improves the guarantee that access rights will\nnot be widened during a rename because of the access right comparison\nbetween the source and the destination (see LANDLOCK_ACCESS_FS_REFER).\nIt may look like this would grant more access on disconnected files and\ndirectories, but the security policies are always enforced for all the\nevaluated hierarchies. This new behavior should be less surprising to\nusers and safer from an access control perspective.\n\nRemove a wrong WARN_ON_ONCE() canary in collect_domain_accesses() and\nfix the related comment.\n\nBecause opened files have their access rights stored in the related file\nsecurity properties, there is no impact for disconnected or unlinked\nfiles.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68736",
"url": "https://www.suse.com/security/cve/CVE-2025-68736"
},
{
"category": "external",
"summary": "SUSE Bug 1255698 for CVE-2025-68736",
"url": "https://bugzilla.suse.com/1255698"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-68736"
},
{
"cve": "CVE-2025-68778",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68778"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: don\u0027t log conflicting inode if it\u0027s a dir moved in the current transaction\n\nWe can\u0027t log a conflicting inode if it\u0027s a directory and it was moved\nfrom one parent directory to another parent directory in the current\ntransaction, as this can result an attempt to have a directory with\ntwo hard links during log replay, one for the old parent directory and\nanother for the new parent directory.\n\nThe following scenario triggers that issue:\n\n1) We have directories \"dir1\" and \"dir2\" created in a past transaction.\n Directory \"dir1\" has inode A as its parent directory;\n\n2) We move \"dir1\" to some other directory;\n\n3) We create a file with the name \"dir1\" in directory inode A;\n\n4) We fsync the new file. This results in logging the inode of the new file\n and the inode for the directory \"dir1\" that was previously moved in the\n current transaction. So the log tree has the INODE_REF item for the\n new location of \"dir1\";\n\n5) We move the new file to some other directory. This results in updating\n the log tree to included the new INODE_REF for the new location of the\n file and removes the INODE_REF for the old location. This happens\n during the rename when we call btrfs_log_new_name();\n\n6) We fsync the file, and that persists the log tree changes done in the\n previous step (btrfs_log_new_name() only updates the log tree in\n memory);\n\n7) We have a power failure;\n\n8) Next time the fs is mounted, log replay happens and when processing\n the inode for directory \"dir1\" we find a new INODE_REF and add that\n link, but we don\u0027t remove the old link of the inode since we have\n not logged the old parent directory of the directory inode \"dir1\".\n\nAs a result after log replay finishes when we trigger writeback of the\nsubvolume tree\u0027s extent buffers, the tree check will detect that we have\na directory a hard link count of 2 and we get a mount failure.\nThe errors and stack traces reported in dmesg/syslog are like this:\n\n [ 3845.729764] BTRFS info (device dm-0): start tree-log replay\n [ 3845.730304] page: refcount:3 mapcount:0 mapping:000000005c8a3027 index:0x1d00 pfn:0x11510c\n [ 3845.731236] memcg:ffff9264c02f4e00\n [ 3845.731751] aops:btree_aops [btrfs] ino:1\n [ 3845.732300] flags: 0x17fffc00000400a(uptodate|private|writeback|node=0|zone=2|lastcpupid=0x1ffff)\n [ 3845.733346] raw: 017fffc00000400a 0000000000000000 dead000000000122 ffff9264d978aea8\n [ 3845.734265] raw: 0000000000001d00 ffff92650e6d4738 00000003ffffffff ffff9264c02f4e00\n [ 3845.735305] page dumped because: eb page dump\n [ 3845.735981] BTRFS critical (device dm-0): corrupt leaf: root=5 block=30408704 slot=6 ino=257, invalid nlink: has 2 expect no more than 1 for dir\n [ 3845.737786] BTRFS info (device dm-0): leaf 30408704 gen 10 total ptrs 17 free space 14881 owner 5\n [ 3845.737789] BTRFS info (device dm-0): refs 4 lock_owner 0 current 30701\n [ 3845.737792] \titem 0 key (256 INODE_ITEM 0) itemoff 16123 itemsize 160\n [ 3845.737794] \t\tinode generation 3 transid 9 size 16 nbytes 16384\n [ 3845.737795] \t\tblock group 0 mode 40755 links 1 uid 0 gid 0\n [ 3845.737797] \t\trdev 0 sequence 2 flags 0x0\n [ 3845.737798] \t\tatime 1764259517.0\n [ 3845.737800] \t\tctime 1764259517.572889464\n [ 3845.737801] \t\tmtime 1764259517.572889464\n [ 3845.737802] \t\totime 1764259517.0\n [ 3845.737803] \titem 1 key (256 INODE_REF 256) itemoff 16111 itemsize 12\n [ 3845.737805] \t\tindex 0 name_len 2\n [ 3845.737807] \titem 2 key (256 DIR_ITEM 2363071922) itemoff 16077 itemsize 34\n [ 3845.737808] \t\tlocation key (257 1 0) type 2\n [ 3845.737810] \t\ttransid 9 data_len 0 name_len 4\n [ 3845.737811] \titem 3 key (256 DIR_ITEM 2676584006) itemoff 16043 itemsize 34\n [ 3845.737813] \t\tlocation key (258 1 0) type 2\n [ 3845.737814] \t\ttransid 9 data_len 0 name_len 4\n [ 3845.737815] \titem 4 key (256 DIR_INDEX 2) itemoff 16009 itemsize 34\n [ 3845.737816] \t\tlocation key (257 1 0) type 2\n [\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68778",
"url": "https://www.suse.com/security/cve/CVE-2025-68778"
},
{
"category": "external",
"summary": "SUSE Bug 1256683 for CVE-2025-68778",
"url": "https://bugzilla.suse.com/1256683"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-68778"
},
{
"cve": "CVE-2025-68785",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68785"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: openvswitch: fix middle attribute validation in push_nsh() action\n\nThe push_nsh() action structure looks like this:\n\n OVS_ACTION_ATTR_PUSH_NSH(OVS_KEY_ATTR_NSH(OVS_NSH_KEY_ATTR_BASE,...))\n\nThe outermost OVS_ACTION_ATTR_PUSH_NSH attribute is OK\u0027ed by the\nnla_for_each_nested() inside __ovs_nla_copy_actions(). The innermost\nOVS_NSH_KEY_ATTR_BASE/MD1/MD2 are OK\u0027ed by the nla_for_each_nested()\ninside nsh_key_put_from_nlattr(). But nothing checks if the attribute\nin the middle is OK. We don\u0027t even check that this attribute is the\nOVS_KEY_ATTR_NSH. We just do a double unwrap with a pair of nla_data()\ncalls - first time directly while calling validate_push_nsh() and the\nsecond time as part of the nla_for_each_nested() macro, which isn\u0027t\nsafe, potentially causing invalid memory access if the size of this\nattribute is incorrect. The failure may not be noticed during\nvalidation due to larger netlink buffer, but cause trouble later during\naction execution where the buffer is allocated exactly to the size:\n\n BUG: KASAN: slab-out-of-bounds in nsh_hdr_from_nlattr+0x1dd/0x6a0 [openvswitch]\n Read of size 184 at addr ffff88816459a634 by task a.out/22624\n\n CPU: 8 UID: 0 PID: 22624 6.18.0-rc7+ #115 PREEMPT(voluntary)\n Call Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x51/0x70\n print_address_description.constprop.0+0x2c/0x390\n kasan_report+0xdd/0x110\n kasan_check_range+0x35/0x1b0\n __asan_memcpy+0x20/0x60\n nsh_hdr_from_nlattr+0x1dd/0x6a0 [openvswitch]\n push_nsh+0x82/0x120 [openvswitch]\n do_execute_actions+0x1405/0x2840 [openvswitch]\n ovs_execute_actions+0xd5/0x3b0 [openvswitch]\n ovs_packet_cmd_execute+0x949/0xdb0 [openvswitch]\n genl_family_rcv_msg_doit+0x1d6/0x2b0\n genl_family_rcv_msg+0x336/0x580\n genl_rcv_msg+0x9f/0x130\n netlink_rcv_skb+0x11f/0x370\n genl_rcv+0x24/0x40\n netlink_unicast+0x73e/0xaa0\n netlink_sendmsg+0x744/0xbf0\n __sys_sendto+0x3d6/0x450\n do_syscall_64+0x79/0x2c0\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n \u003c/TASK\u003e\n\nLet\u0027s add some checks that the attribute is properly sized and it\u0027s\nthe only one attribute inside the action. Technically, there is no\nreal reason for OVS_KEY_ATTR_NSH to be there, as we know that we\u0027re\npushing an NSH header already, it just creates extra nesting, but\nthat\u0027s how uAPI works today. So, keeping as it is.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68785",
"url": "https://www.suse.com/security/cve/CVE-2025-68785"
},
{
"category": "external",
"summary": "SUSE Bug 1256640 for CVE-2025-68785",
"url": "https://bugzilla.suse.com/1256640"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-68785"
},
{
"cve": "CVE-2025-68810",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68810"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: Disallow toggling KVM_MEM_GUEST_MEMFD on an existing memslot\n\nReject attempts to disable KVM_MEM_GUEST_MEMFD on a memslot that was\ninitially created with a guest_memfd binding, as KVM doesn\u0027t support\ntoggling KVM_MEM_GUEST_MEMFD on existing memslots. KVM prevents enabling\nKVM_MEM_GUEST_MEMFD, but doesn\u0027t prevent clearing the flag.\n\nFailure to reject the new memslot results in a use-after-free due to KVM\nnot unbinding from the guest_memfd instance. Unbinding on a FLAGS_ONLY\nchange is easy enough, and can/will be done as a hardening measure (in\nanticipation of KVM supporting dirty logging on guest_memfd at some point),\nbut fixing the use-after-free would only address the immediate symptom.\n\n ==================================================================\n BUG: KASAN: slab-use-after-free in kvm_gmem_release+0x362/0x400 [kvm]\n Write of size 8 at addr ffff8881111ae908 by task repro/745\n\n CPU: 7 UID: 1000 PID: 745 Comm: repro Not tainted 6.18.0-rc6-115d5de2eef3-next-kasan #3 NONE\n Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015\n Call Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x51/0x60\n print_report+0xcb/0x5c0\n kasan_report+0xb4/0xe0\n kvm_gmem_release+0x362/0x400 [kvm]\n __fput+0x2fa/0x9d0\n task_work_run+0x12c/0x200\n do_exit+0x6ae/0x2100\n do_group_exit+0xa8/0x230\n __x64_sys_exit_group+0x3a/0x50\n x64_sys_call+0x737/0x740\n do_syscall_64+0x5b/0x900\n entry_SYSCALL_64_after_hwframe+0x4b/0x53\n RIP: 0033:0x7f581f2eac31\n \u003c/TASK\u003e\n\n Allocated by task 745 on cpu 6 at 9.746971s:\n kasan_save_stack+0x20/0x40\n kasan_save_track+0x13/0x50\n __kasan_kmalloc+0x77/0x90\n kvm_set_memory_region.part.0+0x652/0x1110 [kvm]\n kvm_vm_ioctl+0x14b0/0x3290 [kvm]\n __x64_sys_ioctl+0x129/0x1a0\n do_syscall_64+0x5b/0x900\n entry_SYSCALL_64_after_hwframe+0x4b/0x53\n\n Freed by task 745 on cpu 6 at 9.747467s:\n kasan_save_stack+0x20/0x40\n kasan_save_track+0x13/0x50\n __kasan_save_free_info+0x37/0x50\n __kasan_slab_free+0x3b/0x60\n kfree+0xf5/0x440\n kvm_set_memslot+0x3c2/0x1160 [kvm]\n kvm_set_memory_region.part.0+0x86a/0x1110 [kvm]\n kvm_vm_ioctl+0x14b0/0x3290 [kvm]\n __x64_sys_ioctl+0x129/0x1a0\n do_syscall_64+0x5b/0x900\n entry_SYSCALL_64_after_hwframe+0x4b/0x53",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68810",
"url": "https://www.suse.com/security/cve/CVE-2025-68810"
},
{
"category": "external",
"summary": "SUSE Bug 1256679 for CVE-2025-68810",
"url": "https://bugzilla.suse.com/1256679"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-68810"
},
{
"cve": "CVE-2025-71071",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71071"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\niommu/mediatek: fix use-after-free on probe deferral\n\nThe driver is dropping the references taken to the larb devices during\nprobe after successful lookup as well as on errors. This can\npotentially lead to a use-after-free in case a larb device has not yet\nbeen bound to its driver so that the iommu driver probe defers.\n\nFix this by keeping the references as expected while the iommu driver is\nbound.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71071",
"url": "https://www.suse.com/security/cve/CVE-2025-71071"
},
{
"category": "external",
"summary": "SUSE Bug 1256802 for CVE-2025-71071",
"url": "https://bugzilla.suse.com/1256802"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-71071"
},
{
"cve": "CVE-2025-71104",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71104"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: x86: Fix VM hard lockup after prolonged inactivity with periodic HV timer\n\nWhen advancing the target expiration for the guest\u0027s APIC timer in periodic\nmode, set the expiration to \"now\" if the target expiration is in the past\n(similar to what is done in update_target_expiration()). Blindly adding\nthe period to the previous target expiration can result in KVM generating\na practically unbounded number of hrtimer IRQs due to programming an\nexpired timer over and over. In extreme scenarios, e.g. if userspace\npauses/suspends a VM for an extended duration, this can even cause hard\nlockups in the host.\n\nCurrently, the bug only affects Intel CPUs when using the hypervisor timer\n(HV timer), a.k.a. the VMX preemption timer. Unlike the software timer,\na.k.a. hrtimer, which KVM keeps running even on exits to userspace, the\nHV timer only runs while the guest is active. As a result, if the vCPU\ndoes not run for an extended duration, there will be a huge gap between\nthe target expiration and the current time the vCPU resumes running.\nBecause the target expiration is incremented by only one period on each\ntimer expiration, this leads to a series of timer expirations occurring\nrapidly after the vCPU/VM resumes.\n\nMore critically, when the vCPU first triggers a periodic HV timer\nexpiration after resuming, advancing the expiration by only one period\nwill result in a target expiration in the past. As a result, the delta\nmay be calculated as a negative value. When the delta is converted into\nan absolute value (tscdeadline is an unsigned u64), the resulting value\ncan overflow what the HV timer is capable of programming. I.e. the large\nvalue will exceed the VMX Preemption Timer\u0027s maximum bit width of\ncpu_preemption_timer_multi + 32, and thus cause KVM to switch from the\nHV timer to the software timer (hrtimers).\n\nAfter switching to the software timer, periodic timer expiration callbacks\nmay be executed consecutively within a single clock interrupt handler,\nbecause hrtimers honors KVM\u0027s request for an expiration in the past and\nimmediately re-invokes KVM\u0027s callback after reprogramming. And because\nthe interrupt handler runs with IRQs disabled, restarting KVM\u0027s hrtimer\nover and over until the target expiration is advanced to \"now\" can result\nin a hard lockup.\n\nE.g. the following hard lockup was triggered in the host when running a\nWindows VM (only relevant because it used the APIC timer in periodic mode)\nafter resuming the VM from a long suspend (in the host).\n\n NMI watchdog: Watchdog detected hard LOCKUP on cpu 45\n ...\n RIP: 0010:advance_periodic_target_expiration+0x4d/0x80 [kvm]\n ...\n RSP: 0018:ff4f88f5d98d8ef0 EFLAGS: 00000046\n RAX: fff0103f91be678e RBX: fff0103f91be678e RCX: 00843a7d9e127bcc\n RDX: 0000000000000002 RSI: 0052ca4003697505 RDI: ff440d5bfbdbd500\n RBP: ff440d5956f99200 R08: ff2ff2a42deb6a84 R09: 000000000002a6c0\n R10: 0122d794016332b3 R11: 0000000000000000 R12: ff440db1af39cfc0\n R13: ff440db1af39cfc0 R14: ffffffffc0d4a560 R15: ff440db1af39d0f8\n FS: 00007f04a6ffd700(0000) GS:ff440db1af380000(0000) knlGS:000000e38a3b8000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 000000d5651feff8 CR3: 000000684e038002 CR4: 0000000000773ee0\n PKRU: 55555554\n Call Trace:\n \u003cIRQ\u003e\n apic_timer_fn+0x31/0x50 [kvm]\n __hrtimer_run_queues+0x100/0x280\n hrtimer_interrupt+0x100/0x210\n ? ttwu_do_wakeup+0x19/0x160\n smp_apic_timer_interrupt+0x6a/0x130\n apic_timer_interrupt+0xf/0x20\n \u003c/IRQ\u003e\n\nMoreover, if the suspend duration of the virtual machine is not long enough\nto trigger a hard lockup in this scenario, since commit 98c25ead5eda\n(\"KVM: VMX: Move preemption timer \u003c=\u003e hrtimer dance to common x86\"), KVM\nwill continue using the software timer until the guest reprograms the APIC\ntimer in some way. Since the periodic timer does not require frequent APIC\ntimer register programming, the guest may continue to use the software\ntimer in \n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71104",
"url": "https://www.suse.com/security/cve/CVE-2025-71104"
},
{
"category": "external",
"summary": "SUSE Bug 1256708 for CVE-2025-71104",
"url": "https://bugzilla.suse.com/1256708"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-71104"
},
{
"cve": "CVE-2025-71113",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71113"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: af_alg - zero initialize memory allocated via sock_kmalloc\n\nSeveral crypto user API contexts and requests allocated with\nsock_kmalloc() were left uninitialized, relying on callers to\nset fields explicitly. This resulted in the use of uninitialized\ndata in certain error paths or when new fields are added in the\nfuture.\n\nThe ACVP patches also contain two user-space interface files:\nalgif_kpp.c and algif_akcipher.c. These too rely on proper\ninitialization of their context structures.\n\nA particular issue has been observed with the newly added\n\u0027inflight\u0027 variable introduced in af_alg_ctx by commit:\n\n 67b164a871af (\"crypto: af_alg - Disallow multiple in-flight AIO requests\")\n\nBecause the context is not memset to zero after allocation,\nthe inflight variable has contained garbage values. As a result,\naf_alg_alloc_areq() has incorrectly returned -EBUSY randomly when\nthe garbage value was interpreted as true:\n\n https://github.com/gregkh/linux/blame/master/crypto/af_alg.c#L1209\n\nThe check directly tests ctx-\u003einflight without explicitly\ncomparing against true/false. Since inflight is only ever set to\ntrue or false later, an uninitialized value has triggered\n-EBUSY failures. Zero-initializing memory allocated with\nsock_kmalloc() ensures inflight and other fields start in a known\nstate, removing random issues caused by uninitialized data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71113",
"url": "https://www.suse.com/security/cve/CVE-2025-71113"
},
{
"category": "external",
"summary": "SUSE Bug 1256716 for CVE-2025-71113",
"url": "https://bugzilla.suse.com/1256716"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-71113"
},
{
"cve": "CVE-2025-71126",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71126"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmptcp: avoid deadlock on fallback while reinjecting\n\nJakub reported an MPTCP deadlock at fallback time:\n\n WARNING: possible recursive locking detected\n 6.18.0-rc7-virtme #1 Not tainted\n --------------------------------------------\n mptcp_connect/20858 is trying to acquire lock:\n ff1100001da18b60 (\u0026msk-\u003efallback_lock){+.-.}-{3:3}, at: __mptcp_try_fallback+0xd8/0x280\n\n but task is already holding lock:\n ff1100001da18b60 (\u0026msk-\u003efallback_lock){+.-.}-{3:3}, at: __mptcp_retrans+0x352/0xaa0\n\n other info that might help us debug this:\n Possible unsafe locking scenario:\n\n CPU0\n ----\n lock(\u0026msk-\u003efallback_lock);\n lock(\u0026msk-\u003efallback_lock);\n\n *** DEADLOCK ***\n\n May be due to missing lock nesting notation\n\n 3 locks held by mptcp_connect/20858:\n #0: ff1100001da18290 (sk_lock-AF_INET){+.+.}-{0:0}, at: mptcp_sendmsg+0x114/0x1bc0\n #1: ff1100001db40fd0 (k-sk_lock-AF_INET#2){+.+.}-{0:0}, at: __mptcp_retrans+0x2cb/0xaa0\n #2: ff1100001da18b60 (\u0026msk-\u003efallback_lock){+.-.}-{3:3}, at: __mptcp_retrans+0x352/0xaa0\n\n stack backtrace:\n CPU: 0 UID: 0 PID: 20858 Comm: mptcp_connect Not tainted 6.18.0-rc7-virtme #1 PREEMPT(full)\n Hardware name: Bochs, BIOS Bochs 01/01/2011\n Call Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x6f/0xa0\n print_deadlock_bug.cold+0xc0/0xcd\n validate_chain+0x2ff/0x5f0\n __lock_acquire+0x34c/0x740\n lock_acquire.part.0+0xbc/0x260\n _raw_spin_lock_bh+0x38/0x50\n __mptcp_try_fallback+0xd8/0x280\n mptcp_sendmsg_frag+0x16c2/0x3050\n __mptcp_retrans+0x421/0xaa0\n mptcp_release_cb+0x5aa/0xa70\n release_sock+0xab/0x1d0\n mptcp_sendmsg+0xd5b/0x1bc0\n sock_write_iter+0x281/0x4d0\n new_sync_write+0x3c5/0x6f0\n vfs_write+0x65e/0xbb0\n ksys_write+0x17e/0x200\n do_syscall_64+0xbb/0xfd0\n entry_SYSCALL_64_after_hwframe+0x4b/0x53\n RIP: 0033:0x7fa5627cbc5e\n Code: 4d 89 d8 e8 14 bd 00 00 4c 8b 5d f8 41 8b 93 08 03 00 00 59 5e 48 83 f8 fc 74 11 c9 c3 0f 1f 80 00 00 00 00 48 8b 45 10 0f 05 \u003cc9\u003e c3 83 e2 39 83 fa 08 75 e7 e8 13 ff ff ff 0f 1f 00 f3 0f 1e fa\n RSP: 002b:00007fff1fe14700 EFLAGS: 00000202 ORIG_RAX: 0000000000000001\n RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007fa5627cbc5e\n RDX: 0000000000001f9c RSI: 00007fff1fe16984 RDI: 0000000000000005\n RBP: 00007fff1fe14710 R08: 0000000000000000 R09: 0000000000000000\n R10: 0000000000000000 R11: 0000000000000202 R12: 00007fff1fe16920\n R13: 0000000000002000 R14: 0000000000001f9c R15: 0000000000001f9c\n\nThe packet scheduler could attempt a reinjection after receiving an\nMP_FAIL and before the infinite map has been transmitted, causing a\ndeadlock since MPTCP needs to do the reinjection atomically from WRT\nfallback.\n\nAddress the issue explicitly avoiding the reinjection in the critical\nscenario. Note that this is the only fallback critical section that\ncould potentially send packets and hit the double-lock.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71126",
"url": "https://www.suse.com/security/cve/CVE-2025-71126"
},
{
"category": "external",
"summary": "SUSE Bug 1256755 for CVE-2025-71126",
"url": "https://bugzilla.suse.com/1256755"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-71126"
},
{
"cve": "CVE-2025-71148",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71148"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/handshake: restore destructor on submit failure\n\nhandshake_req_submit() replaces sk-\u003esk_destruct but never restores it when\nsubmission fails before the request is hashed. handshake_sk_destruct() then\nreturns early and the original destructor never runs, leaking the socket.\nRestore sk_destruct on the error path.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71148",
"url": "https://www.suse.com/security/cve/CVE-2025-71148"
},
{
"category": "external",
"summary": "SUSE Bug 1257159 for CVE-2025-71148",
"url": "https://bugzilla.suse.com/1257159"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-71148"
},
{
"cve": "CVE-2025-71182",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71182"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: j1939: make j1939_session_activate() fail if device is no longer registered\n\nsyzbot is still reporting\n\n unregister_netdevice: waiting for vcan0 to become free. Usage count = 2\n\neven after commit 93a27b5891b8 (\"can: j1939: add missing calls in\nNETDEV_UNREGISTER notification handler\") was added. A debug printk() patch\nfound that j1939_session_activate() can succeed even after\nj1939_cancel_active_session() from j1939_netdev_notify(NETDEV_UNREGISTER)\nhas completed.\n\nSince j1939_cancel_active_session() is processed with the session list lock\nheld, checking ndev-\u003ereg_state in j1939_session_activate() with the session\nlist lock held can reliably close the race window.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71182",
"url": "https://www.suse.com/security/cve/CVE-2025-71182"
},
{
"category": "external",
"summary": "SUSE Bug 1257586 for CVE-2025-71182",
"url": "https://bugzilla.suse.com/1257586"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-71182"
},
{
"cve": "CVE-2025-71184",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71184"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix NULL dereference on root when tracing inode eviction\n\nWhen evicting an inode the first thing we do is to setup tracing for it,\nwhich implies fetching the root\u0027s id. But in btrfs_evict_inode() the\nroot might be NULL, as implied in the next check that we do in\nbtrfs_evict_inode().\n\nHence, we either should set the -\u003eroot_objectid to 0 in case the root is\nNULL, or we move tracing setup after checking that the root is not\nNULL. Setting the rootid to 0 at least gives us the possibility to trace\nthis call even in the case when the root is NULL, so that\u0027s the solution\ntaken here.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71184",
"url": "https://www.suse.com/security/cve/CVE-2025-71184"
},
{
"category": "external",
"summary": "SUSE Bug 1257635 for CVE-2025-71184",
"url": "https://bugzilla.suse.com/1257635"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-71184"
},
{
"cve": "CVE-2025-71185",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71185"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: ti: dma-crossbar: fix device leak on am335x route allocation\n\nMake sure to drop the reference taken when looking up the crossbar\nplatform device during am335x route allocation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71185",
"url": "https://www.suse.com/security/cve/CVE-2025-71185"
},
{
"category": "external",
"summary": "SUSE Bug 1257560 for CVE-2025-71185",
"url": "https://bugzilla.suse.com/1257560"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-71185"
},
{
"cve": "CVE-2025-71188",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71188"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: lpc18xx-dmamux: fix device leak on route allocation\n\nMake sure to drop the reference taken when looking up the DMA mux\nplatform device during route allocation.\n\nNote that holding a reference to a device does not prevent its driver\ndata from going away so there is no point in keeping the reference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71188",
"url": "https://www.suse.com/security/cve/CVE-2025-71188"
},
{
"category": "external",
"summary": "SUSE Bug 1257576 for CVE-2025-71188",
"url": "https://bugzilla.suse.com/1257576"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-71188"
},
{
"cve": "CVE-2025-71189",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71189"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: dw: dmamux: fix OF node leak on route allocation failure\n\nMake sure to drop the reference taken to the DMA master OF node also on\nlate route allocation failures.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71189",
"url": "https://www.suse.com/security/cve/CVE-2025-71189"
},
{
"category": "external",
"summary": "SUSE Bug 1257573 for CVE-2025-71189",
"url": "https://bugzilla.suse.com/1257573"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "low"
}
],
"title": "CVE-2025-71189"
},
{
"cve": "CVE-2025-71190",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71190"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: bcm-sba-raid: fix device leak on probe\n\nMake sure to drop the reference taken when looking up the mailbox device\nduring probe on probe failures and on driver unbind.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71190",
"url": "https://www.suse.com/security/cve/CVE-2025-71190"
},
{
"category": "external",
"summary": "SUSE Bug 1257580 for CVE-2025-71190",
"url": "https://bugzilla.suse.com/1257580"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "low"
}
],
"title": "CVE-2025-71190"
},
{
"cve": "CVE-2025-71191",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71191"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: at_hdmac: fix device leak on of_dma_xlate()\n\nMake sure to drop the reference taken when looking up the DMA platform\ndevice during of_dma_xlate() when releasing channel resources.\n\nNote that commit 3832b78b3ec2 (\"dmaengine: at_hdmac: add missing\nput_device() call in at_dma_xlate()\") fixed the leak in a couple of\nerror paths but the reference is still leaking on successful allocation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71191",
"url": "https://www.suse.com/security/cve/CVE-2025-71191"
},
{
"category": "external",
"summary": "SUSE Bug 1257579 for CVE-2025-71191",
"url": "https://bugzilla.suse.com/1257579"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "low"
}
],
"title": "CVE-2025-71191"
},
{
"cve": "CVE-2025-71192",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71192"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: ac97: fix a double free in snd_ac97_controller_register()\n\nIf ac97_add_adapter() fails, put_device() is the correct way to drop\nthe device reference. kfree() is not required.\nAdd kfree() if idr_alloc() fails and in ac97_adapter_release() to do\nthe cleanup.\n\nFound by code review.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71192",
"url": "https://www.suse.com/security/cve/CVE-2025-71192"
},
{
"category": "external",
"summary": "SUSE Bug 1257679 for CVE-2025-71192",
"url": "https://bugzilla.suse.com/1257679"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-71192"
},
{
"cve": "CVE-2025-71194",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71194"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix deadlock in wait_current_trans() due to ignored transaction type\n\nWhen wait_current_trans() is called during start_transaction(), it\ncurrently waits for a blocked transaction without considering whether\nthe given transaction type actually needs to wait for that particular\ntransaction state. The btrfs_blocked_trans_types[] array already defines\nwhich transaction types should wait for which transaction states, but\nthis check was missing in wait_current_trans().\n\nThis can lead to a deadlock scenario involving two transactions and\npending ordered extents:\n\n 1. Transaction A is in TRANS_STATE_COMMIT_DOING state\n\n 2. A worker processing an ordered extent calls start_transaction()\n with TRANS_JOIN\n\n 3. join_transaction() returns -EBUSY because Transaction A is in\n TRANS_STATE_COMMIT_DOING\n\n 4. Transaction A moves to TRANS_STATE_UNBLOCKED and completes\n\n 5. A new Transaction B is created (TRANS_STATE_RUNNING)\n\n 6. The ordered extent from step 2 is added to Transaction B\u0027s\n pending ordered extents\n\n 7. Transaction B immediately starts commit by another task and\n enters TRANS_STATE_COMMIT_START\n\n 8. The worker finally reaches wait_current_trans(), sees Transaction B\n in TRANS_STATE_COMMIT_START (a blocked state), and waits\n unconditionally\n\n 9. However, TRANS_JOIN should NOT wait for TRANS_STATE_COMMIT_START\n according to btrfs_blocked_trans_types[]\n\n 10. Transaction B is waiting for pending ordered extents to complete\n\n 11. Deadlock: Transaction B waits for ordered extent, ordered extent\n waits for Transaction B\n\nThis can be illustrated by the following call stacks:\n CPU0 CPU1\n btrfs_finish_ordered_io()\n start_transaction(TRANS_JOIN)\n join_transaction()\n # -EBUSY (Transaction A is\n # TRANS_STATE_COMMIT_DOING)\n # Transaction A completes\n # Transaction B created\n # ordered extent added to\n # Transaction B\u0027s pending list\n btrfs_commit_transaction()\n # Transaction B enters\n # TRANS_STATE_COMMIT_START\n # waiting for pending ordered\n # extents\n wait_current_trans()\n # waits for Transaction B\n # (should not wait!)\n\nTask bstore_kv_sync in btrfs_commit_transaction waiting for ordered\nextents:\n\n __schedule+0x2e7/0x8a0\n schedule+0x64/0xe0\n btrfs_commit_transaction+0xbf7/0xda0 [btrfs]\n btrfs_sync_file+0x342/0x4d0 [btrfs]\n __x64_sys_fdatasync+0x4b/0x80\n do_syscall_64+0x33/0x40\n entry_SYSCALL_64_after_hwframe+0x44/0xa9\n\nTask kworker in wait_current_trans waiting for transaction commit:\n\n Workqueue: btrfs-syno_nocow btrfs_work_helper [btrfs]\n __schedule+0x2e7/0x8a0\n schedule+0x64/0xe0\n wait_current_trans+0xb0/0x110 [btrfs]\n start_transaction+0x346/0x5b0 [btrfs]\n btrfs_finish_ordered_io.isra.0+0x49b/0x9c0 [btrfs]\n btrfs_work_helper+0xe8/0x350 [btrfs]\n process_one_work+0x1d3/0x3c0\n worker_thread+0x4d/0x3e0\n kthread+0x12d/0x150\n ret_from_fork+0x1f/0x30\n\nFix this by passing the transaction type to wait_current_trans() and\nchecking btrfs_blocked_trans_types[cur_trans-\u003estate] against the given\ntype before deciding to wait. This ensures that transaction types which\nare allowed to join during certain blocked states will not unnecessarily\nwait and cause deadlocks.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71194",
"url": "https://www.suse.com/security/cve/CVE-2025-71194"
},
{
"category": "external",
"summary": "SUSE Bug 1257687 for CVE-2025-71194",
"url": "https://bugzilla.suse.com/1257687"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-71194"
},
{
"cve": "CVE-2025-71195",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71195"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: xilinx: xdma: Fix regmap max_register\n\nThe max_register field is assigned the size of the register memory\nregion instead of the offset of the last register.\nThe result is that reading from the regmap via debugfs can cause\na segmentation fault:\n\ntail /sys/kernel/debug/regmap/xdma.1.auto/registers\nUnable to handle kernel paging request at virtual address ffff800082f70000\nMem abort info:\n ESR = 0x0000000096000007\n EC = 0x25: DABT (current EL), IL = 32 bits\n SET = 0, FnV = 0\n EA = 0, S1PTW = 0\n FSC = 0x07: level 3 translation fault\n[...]\nCall trace:\n regmap_mmio_read32le+0x10/0x30\n _regmap_bus_reg_read+0x74/0xc0\n _regmap_read+0x68/0x198\n regmap_read+0x54/0x88\n regmap_read_debugfs+0x140/0x380\n regmap_map_read_file+0x30/0x48\n full_proxy_read+0x68/0xc8\n vfs_read+0xcc/0x310\n ksys_read+0x7c/0x120\n __arm64_sys_read+0x24/0x40\n invoke_syscall.constprop.0+0x64/0x108\n do_el0_svc+0xb0/0xd8\n el0_svc+0x38/0x130\n el0t_64_sync_handler+0x120/0x138\n el0t_64_sync+0x194/0x198\nCode: aa1e03e9 d503201f f9400000 8b214000 (b9400000)\n---[ end trace 0000000000000000 ]---\nnote: tail[1217] exited with irqs disabled\nnote: tail[1217] exited with preempt_count 1\nSegmentation fault",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71195",
"url": "https://www.suse.com/security/cve/CVE-2025-71195"
},
{
"category": "external",
"summary": "SUSE Bug 1257704 for CVE-2025-71195",
"url": "https://bugzilla.suse.com/1257704"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-71195"
},
{
"cve": "CVE-2025-71196",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71196"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nphy: stm32-usphyc: Fix off by one in probe()\n\nThe \"index\" variable is used as an index into the usbphyc-\u003ephys[] array\nwhich has usbphyc-\u003enphys elements. So if it is equal to usbphyc-\u003enphys\nthen it is one element out of bounds. The \"index\" comes from the\ndevice tree so it\u0027s data that we trust and it\u0027s unlikely to be wrong,\nhowever it\u0027s obviously still worth fixing the bug. Change the \u003e to \u003e=.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71196",
"url": "https://www.suse.com/security/cve/CVE-2025-71196"
},
{
"category": "external",
"summary": "SUSE Bug 1257716 for CVE-2025-71196",
"url": "https://bugzilla.suse.com/1257716"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-71196"
},
{
"cve": "CVE-2025-71197",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71197"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nw1: therm: Fix off-by-one buffer overflow in alarms_store\n\nThe sysfs buffer passed to alarms_store() is allocated with \u0027size + 1\u0027\nbytes and a NUL terminator is appended. However, the \u0027size\u0027 argument\ndoes not account for this extra byte. The original code then allocated\n\u0027size\u0027 bytes and used strcpy() to copy \u0027buf\u0027, which always writes one\nbyte past the allocated buffer since strcpy() copies until the NUL\nterminator at index \u0027size\u0027.\n\nFix this by parsing the \u0027buf\u0027 parameter directly using simple_strtoll()\nwithout allocating any intermediate memory or string copying. This\nremoves the overflow while simplifying the code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71197",
"url": "https://www.suse.com/security/cve/CVE-2025-71197"
},
{
"category": "external",
"summary": "SUSE Bug 1257743 for CVE-2025-71197",
"url": "https://bugzilla.suse.com/1257743"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-71197"
},
{
"cve": "CVE-2025-71198",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71198"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\niio: imu: st_lsm6dsx: fix iio_chan_spec for sensors without event detection\n\nThe st_lsm6dsx_acc_channels array of struct iio_chan_spec has a non-NULL\nevent_spec field, indicating support for IIO events. However, event\ndetection is not supported for all sensors, and if userspace tries to\nconfigure accelerometer wakeup events on a sensor device that does not\nsupport them (e.g. LSM6DS0), st_lsm6dsx_write_event() dereferences a NULL\npointer when trying to write to the wakeup register.\nDefine an additional struct iio_chan_spec array whose members have a NULL\nevent_spec field, and use this array instead of st_lsm6dsx_acc_channels for\nsensors without event detection capability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71198",
"url": "https://www.suse.com/security/cve/CVE-2025-71198"
},
{
"category": "external",
"summary": "SUSE Bug 1257741 for CVE-2025-71198",
"url": "https://bugzilla.suse.com/1257741"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-71198"
},
{
"cve": "CVE-2025-71199",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71199"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\niio: adc: at91-sama5d2_adc: Fix potential use-after-free in sama5d2_adc driver\n\nat91_adc_interrupt can call at91_adc_touch_data_handler function\nto start the work by schedule_work(\u0026st-\u003etouch_st.workq).\n\nIf we remove the module which will call at91_adc_remove to\nmake cleanup, it will free indio_dev through iio_device_unregister but\nquite a bit later. While the work mentioned above will be used. The\nsequence of operations that may lead to a UAF bug is as follows:\n\nCPU0 CPU1\n\n | at91_adc_workq_handler\nat91_adc_remove |\niio_device_unregister(indio_dev) |\n//free indio_dev a bit later |\n | iio_push_to_buffers(indio_dev)\n | //use indio_dev\n\nFix it by ensuring that the work is canceled before proceeding with\nthe cleanup in at91_adc_remove.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71199",
"url": "https://www.suse.com/security/cve/CVE-2025-71199"
},
{
"category": "external",
"summary": "SUSE Bug 1257750 for CVE-2025-71199",
"url": "https://bugzilla.suse.com/1257750"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-71199"
},
{
"cve": "CVE-2025-71200",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71200"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmmc: sdhci-of-dwcmshc: Prevent illegal clock reduction in HS200/HS400 mode\n\nWhen operating in HS200 or HS400 timing modes, reducing the clock frequency\nbelow 52MHz will lead to link broken as the Rockchip DWC MSHC controller\nrequires maintaining a minimum clock of 52MHz in these modes.\n\nAdd a check to prevent illegal clock reduction through debugfs:\n\nroot@debian:/# echo 50000000 \u003e /sys/kernel/debug/mmc0/clock\nroot@debian:/# [ 30.090146] mmc0: running CQE recovery\nmmc0: cqhci: Failed to halt\nmmc0: cqhci: spurious TCN for tag 0\nWARNING: drivers/mmc/host/cqhci-core.c:797 at cqhci_irq+0x254/0x818, CPU#1: kworker/1:0H/24\nModules linked in:\nCPU: 1 UID: 0 PID: 24 Comm: kworker/1:0H Not tainted 6.19.0-rc1-00001-g09db0998649d-dirty #204 PREEMPT\nHardware name: Rockchip RK3588 EVB1 V10 Board (DT)\nWorkqueue: kblockd blk_mq_run_work_fn\npstate: 604000c9 (nZCv daIF +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\npc : cqhci_irq+0x254/0x818\nlr : cqhci_irq+0x254/0x818\n...",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71200",
"url": "https://www.suse.com/security/cve/CVE-2025-71200"
},
{
"category": "external",
"summary": "SUSE Bug 1258222 for CVE-2025-71200",
"url": "https://bugzilla.suse.com/1258222"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-71200"
},
{
"cve": "CVE-2025-71222",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71222"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: wlcore: ensure skb headroom before skb_push\n\nThis avoids occasional skb_under_panic Oops from wl1271_tx_work. In this case, headroom is\nless than needed (typically 110 - 94 = 16 bytes).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71222",
"url": "https://www.suse.com/security/cve/CVE-2025-71222"
},
{
"category": "external",
"summary": "SUSE Bug 1258279 for CVE-2025-71222",
"url": "https://bugzilla.suse.com/1258279"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-71222"
},
{
"cve": "CVE-2025-71224",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71224"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mac80211: ocb: skip rx_no_sta when interface is not joined\n\nieee80211_ocb_rx_no_sta() assumes a valid channel context, which is only\npresent after JOIN_OCB.\n\nRX may run before JOIN_OCB is executed, in which case the OCB interface\nis not operational. Skip RX peer handling when the interface is not\njoined to avoid warnings in the RX path.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71224",
"url": "https://www.suse.com/security/cve/CVE-2025-71224"
},
{
"category": "external",
"summary": "SUSE Bug 1258824 for CVE-2025-71224",
"url": "https://bugzilla.suse.com/1258824"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-71224"
},
{
"cve": "CVE-2025-71225",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71225"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmd: suspend array while updating raid_disks via sysfs\n\nIn raid1_reshape(), freeze_array() is called before modifying the r1bio\nmemory pool (conf-\u003er1bio_pool) and conf-\u003eraid_disks, and\nunfreeze_array() is called after the update is completed.\n\nHowever, freeze_array() only waits until nr_sync_pending and\n(nr_pending - nr_queued) of all buckets reaches zero. When an I/O error\noccurs, nr_queued is increased and the corresponding r1bio is queued to\neither retry_list or bio_end_io_list. As a result, freeze_array() may\nunblock before these r1bios are released.\n\nThis can lead to a situation where conf-\u003eraid_disks and the mempool have\nalready been updated while queued r1bios, allocated with the old\nraid_disks value, are later released. Consequently, free_r1bio() may\naccess memory out of bounds in put_all_bios() and release r1bios of the\nwrong size to the new mempool, potentially causing issues with the\nmempool as well.\n\nSince only normal I/O might increase nr_queued while an I/O error occurs,\nsuspending the array avoids this issue.\n\nNote: Updating raid_disks via ioctl SET_ARRAY_INFO already suspends\nthe array. Therefore, we suspend the array when updating raid_disks\nvia sysfs to avoid this issue too.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71225",
"url": "https://www.suse.com/security/cve/CVE-2025-71225"
},
{
"category": "external",
"summary": "SUSE Bug 1258411 for CVE-2025-71225",
"url": "https://bugzilla.suse.com/1258411"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-71225"
},
{
"cve": "CVE-2025-71229",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71229"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: rtw88: Fix alignment fault in rtw_core_enable_beacon()\n\nrtw_core_enable_beacon() reads 4 bytes from an address that is not a\nmultiple of 4. This results in a crash on some systems.\n\nDo 1 byte reads/writes instead.\n\nUnable to handle kernel paging request at virtual address ffff8000827e0522\nMem abort info:\n ESR = 0x0000000096000021\n EC = 0x25: DABT (current EL), IL = 32 bits\n SET = 0, FnV = 0\n EA = 0, S1PTW = 0\n FSC = 0x21: alignment fault\nData abort info:\n ISV = 0, ISS = 0x00000021, ISS2 = 0x00000000\n CM = 0, WnR = 0, TnD = 0, TagAccess = 0\n GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0\nswapper pgtable: 4k pages, 48-bit VAs, pgdp=0000000005492000\n[ffff8000827e0522] pgd=0000000000000000, p4d=10000001021d9403, pud=10000001021da403, pmd=100000011061c403, pte=00780000f3200f13\nInternal error: Oops: 0000000096000021 [#1] SMP\nModules linked in: [...] rtw88_8822ce rtw88_8822c rtw88_pci rtw88_core [...]\nCPU: 0 UID: 0 PID: 73 Comm: kworker/u32:2 Tainted: G W 6.17.9 #1-NixOS VOLUNTARY\nTainted: [W]=WARN\nHardware name: FriendlyElec NanoPC-T6 LTS (DT)\nWorkqueue: phy0 rtw_c2h_work [rtw88_core]\npstate: 60400009 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\npc : rtw_pci_read32+0x18/0x40 [rtw88_pci]\nlr : rtw_core_enable_beacon+0xe0/0x148 [rtw88_core]\nsp : ffff800080cc3ca0\nx29: ffff800080cc3ca0 x28: ffff0001031fc240 x27: ffff000102100828\nx26: ffffd2cb7c9b4088 x25: ffff0001031fc2c0 x24: ffff000112fdef00\nx23: ffff000112fdef18 x22: ffff000111c29970 x21: 0000000000000001\nx20: 0000000000000001 x19: ffff000111c22040 x18: 0000000000000000\nx17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000\nx14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000\nx11: 0000000000000000 x10: 0000000000000000 x9 : ffffd2cb6507c090\nx8 : 0000000000000000 x7 : 0000000000000000 x6 : 0000000000000000\nx5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000000\nx2 : 0000000000007f10 x1 : 0000000000000522 x0 : ffff8000827e0522\nCall trace:\n rtw_pci_read32+0x18/0x40 [rtw88_pci] (P)\n rtw_hw_scan_chan_switch+0x124/0x1a8 [rtw88_core]\n rtw_fw_c2h_cmd_handle+0x254/0x290 [rtw88_core]\n rtw_c2h_work+0x50/0x98 [rtw88_core]\n process_one_work+0x178/0x3f8\n worker_thread+0x208/0x418\n kthread+0x120/0x220\n ret_from_fork+0x10/0x20\nCode: d28fe202 8b020000 f9524400 8b214000 (b9400000)\n---[ end trace 0000000000000000 ]---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71229",
"url": "https://www.suse.com/security/cve/CVE-2025-71229"
},
{
"category": "external",
"summary": "SUSE Bug 1258415 for CVE-2025-71229",
"url": "https://bugzilla.suse.com/1258415"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-71229"
},
{
"cve": "CVE-2025-71231",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71231"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: iaa - Fix out-of-bounds index in find_empty_iaa_compression_mode\n\nThe local variable \u0027i\u0027 is initialized with -EINVAL, but the for loop\nimmediately overwrites it and -EINVAL is never returned.\n\nIf no empty compression mode can be found, the function would return the\nout-of-bounds index IAA_COMP_MODES_MAX, which would cause an invalid\narray access in add_iaa_compression_mode().\n\nFix both issues by returning either a valid index or -EINVAL.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71231",
"url": "https://www.suse.com/security/cve/CVE-2025-71231"
},
{
"category": "external",
"summary": "SUSE Bug 1258424 for CVE-2025-71231",
"url": "https://bugzilla.suse.com/1258424"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "important"
}
],
"title": "CVE-2025-71231"
},
{
"cve": "CVE-2025-71232",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71232"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla2xxx: Free sp in error path to fix system crash\n\nSystem crash seen during load/unload test in a loop,\n\n[61110.449331] qla2xxx [0000:27:00.0]-0042:0: Disabled MSI-X.\n[61110.467494] =============================================================================\n[61110.467498] BUG qla2xxx_srbs (Tainted: G OE -------- --- ): Objects remaining in qla2xxx_srbs on __kmem_cache_shutdown()\n[61110.467501] -----------------------------------------------------------------------------\n\n[61110.467502] Slab 0x000000000ffc8162 objects=51 used=1 fp=0x00000000e25d3d85 flags=0x57ffffc0010200(slab|head|node=1|zone=2|lastcpupid=0x1fffff)\n[61110.467509] CPU: 53 PID: 455206 Comm: rmmod Kdump: loaded Tainted: G OE -------- --- 5.14.0-284.11.1.el9_2.x86_64 #1\n[61110.467513] Hardware name: HPE ProLiant DL385 Gen10 Plus v2/ProLiant DL385 Gen10 Plus v2, BIOS A42 08/17/2023\n[61110.467515] Call Trace:\n[61110.467516] \u003cTASK\u003e\n[61110.467519] dump_stack_lvl+0x34/0x48\n[61110.467526] slab_err.cold+0x53/0x67\n[61110.467534] __kmem_cache_shutdown+0x16e/0x320\n[61110.467540] kmem_cache_destroy+0x51/0x160\n[61110.467544] qla2x00_module_exit+0x93/0x99 [qla2xxx]\n[61110.467607] ? __do_sys_delete_module.constprop.0+0x178/0x280\n[61110.467613] ? syscall_trace_enter.constprop.0+0x145/0x1d0\n[61110.467616] ? do_syscall_64+0x5c/0x90\n[61110.467619] ? exc_page_fault+0x62/0x150\n[61110.467622] ? entry_SYSCALL_64_after_hwframe+0x63/0xcd\n[61110.467626] \u003c/TASK\u003e\n[61110.467627] Disabling lock debugging due to kernel taint\n[61110.467635] Object 0x0000000026f7e6e6 @offset=16000\n[61110.467639] ------------[ cut here ]------------\n[61110.467639] kmem_cache_destroy qla2xxx_srbs: Slab cache still has objects when called from qla2x00_module_exit+0x93/0x99 [qla2xxx]\n[61110.467659] WARNING: CPU: 53 PID: 455206 at mm/slab_common.c:520 kmem_cache_destroy+0x14d/0x160\n[61110.467718] CPU: 53 PID: 455206 Comm: rmmod Kdump: loaded Tainted: G B OE -------- --- 5.14.0-284.11.1.el9_2.x86_64 #1\n[61110.467720] Hardware name: HPE ProLiant DL385 Gen10 Plus v2/ProLiant DL385 Gen10 Plus v2, BIOS A42 08/17/2023\n[61110.467721] RIP: 0010:kmem_cache_destroy+0x14d/0x160\n[61110.467724] Code: 99 7d 07 00 48 89 ef e8 e1 6a 07 00 eb b3 48 8b 55 60 48 8b 4c 24 20 48 c7 c6 70 fc 66 90 48 c7 c7 f8 ef a1 90 e8 e1 ed 7c 00 \u003c0f\u003e 0b eb 93 c3 cc cc cc cc 66 2e 0f 1f 84 00 00 00 00 00 55 48 89\n[61110.467725] RSP: 0018:ffffa304e489fe80 EFLAGS: 00010282\n[61110.467727] RAX: 0000000000000000 RBX: ffffffffc0d9a860 RCX: 0000000000000027\n[61110.467729] RDX: ffff8fd5ff9598a8 RSI: 0000000000000001 RDI: ffff8fd5ff9598a0\n[61110.467730] RBP: ffff8fb6aaf78700 R08: 0000000000000000 R09: 0000000100d863b7\n[61110.467731] R10: ffffa304e489fd20 R11: ffffffff913bef48 R12: 0000000040002000\n[61110.467731] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000\n[61110.467733] FS: 00007f64c89fb740(0000) GS:ffff8fd5ff940000(0000) knlGS:0000000000000000\n[61110.467734] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[61110.467735] CR2: 00007f0f02bfe000 CR3: 00000020ad6dc005 CR4: 0000000000770ee0\n[61110.467736] PKRU: 55555554\n[61110.467737] Call Trace:\n[61110.467738] \u003cTASK\u003e\n[61110.467739] qla2x00_module_exit+0x93/0x99 [qla2xxx]\n[61110.467755] ? __do_sys_delete_module.constprop.0+0x178/0x280\n\nFree sp in the error path to fix the crash.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71232",
"url": "https://www.suse.com/security/cve/CVE-2025-71232"
},
{
"category": "external",
"summary": "SUSE Bug 1258422 for CVE-2025-71232",
"url": "https://bugzilla.suse.com/1258422"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-71232"
},
{
"cve": "CVE-2025-71234",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71234"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: rtl8xxxu: fix slab-out-of-bounds in rtl8xxxu_sta_add\n\nThe driver does not set hw-\u003esta_data_size, which causes mac80211 to\nallocate insufficient space for driver private station data in\n__sta_info_alloc(). When rtl8xxxu_sta_add() accesses members of\nstruct rtl8xxxu_sta_info through sta-\u003edrv_priv, this results in a\nslab-out-of-bounds write.\n\nKASAN report on RISC-V (VisionFive 2) with RTL8192EU adapter:\n\n BUG: KASAN: slab-out-of-bounds in rtl8xxxu_sta_add+0x31c/0x346\n Write of size 8 at addr ffffffd6d3e9ae88 by task kworker/u16:0/12\n\nSet hw-\u003esta_data_size to sizeof(struct rtl8xxxu_sta_info) during\nprobe, similar to how hw-\u003evif_data_size is configured. This ensures\nmac80211 allocates sufficient space for the driver\u0027s per-station\nprivate data.\n\nTested on StarFive VisionFive 2 v1.2A board.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71234",
"url": "https://www.suse.com/security/cve/CVE-2025-71234"
},
{
"category": "external",
"summary": "SUSE Bug 1258419 for CVE-2025-71234",
"url": "https://bugzilla.suse.com/1258419"
},
{
"category": "external",
"summary": "SUSE Bug 1258420 for CVE-2025-71234",
"url": "https://bugzilla.suse.com/1258420"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "important"
}
],
"title": "CVE-2025-71234"
},
{
"cve": "CVE-2025-71235",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71235"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla2xxx: Delay module unload while fabric scan in progress\n\nSystem crash seen during load/unload test in a loop.\n\n[105954.384919] RBP: ffff914589838dc0 R08: 0000000000000000 R09: 0000000000000086\n[105954.384920] R10: 000000000000000f R11: ffffa31240904be5 R12: ffff914605f868e0\n[105954.384921] R13: ffff914605f86910 R14: 0000000000008010 R15: 00000000ddb7c000\n[105954.384923] FS: 0000000000000000(0000) GS:ffff9163fec40000(0000) knlGS:0000000000000000\n[105954.384925] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[105954.384926] CR2: 000055d31ce1d6a0 CR3: 0000000119f5e001 CR4: 0000000000770ee0\n[105954.384928] PKRU: 55555554\n[105954.384929] Call Trace:\n[105954.384931] \u003cIRQ\u003e\n[105954.384934] qla24xx_sp_unmap+0x1f3/0x2a0 [qla2xxx]\n[105954.384962] ? qla_async_scan_sp_done+0x114/0x1f0 [qla2xxx]\n[105954.384980] ? qla24xx_els_ct_entry+0x4de/0x760 [qla2xxx]\n[105954.384999] ? __wake_up_common+0x80/0x190\n[105954.385004] ? qla24xx_process_response_queue+0xc2/0xaa0 [qla2xxx]\n[105954.385023] ? qla24xx_msix_rsp_q+0x44/0xb0 [qla2xxx]\n[105954.385040] ? __handle_irq_event_percpu+0x3d/0x190\n[105954.385044] ? handle_irq_event+0x58/0xb0\n[105954.385046] ? handle_edge_irq+0x93/0x240\n[105954.385050] ? __common_interrupt+0x41/0xa0\n[105954.385055] ? common_interrupt+0x3e/0xa0\n[105954.385060] ? asm_common_interrupt+0x22/0x40\n\nThe root cause of this was that there was a free (dma_free_attrs) in the\ninterrupt context. There was a device discovery/fabric scan in\nprogress. A module unload was issued which set the UNLOADING flag. As\npart of the discovery, after receiving an interrupt a work queue was\nscheduled (which involved a work to be queued). Since the UNLOADING\nflag is set, the work item was not allocated and the mapped memory had\nto be freed. The free occurred in interrupt context leading to system\ncrash. Delay the driver unload until the fabric scan is complete to\navoid the crash.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71235",
"url": "https://www.suse.com/security/cve/CVE-2025-71235"
},
{
"category": "external",
"summary": "SUSE Bug 1258469 for CVE-2025-71235",
"url": "https://bugzilla.suse.com/1258469"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-71235"
},
{
"cve": "CVE-2025-71236",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71236"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla2xxx: Validate sp before freeing associated memory\n\nSystem crash with the following signature\n[154563.214890] nvme nvme2: NVME-FC{1}: controller connect complete\n[154564.169363] qla2xxx [0000:b0:00.1]-3002:2: nvme: Sched: Set ZIO exchange threshold to 3.\n[154564.169405] qla2xxx [0000:b0:00.1]-ffffff:2: SET ZIO Activity exchange threshold to 5.\n[154565.539974] qla2xxx [0000:b0:00.1]-5013:2: RSCN database changed - 0078 0080 0000.\n[154565.545744] qla2xxx [0000:b0:00.1]-5013:2: RSCN database changed - 0078 00a0 0000.\n[154565.545857] qla2xxx [0000:b0:00.1]-11a2:2: FEC=enabled (data rate).\n[154565.552760] qla2xxx [0000:b0:00.1]-11a2:2: FEC=enabled (data rate).\n[154565.553079] BUG: kernel NULL pointer dereference, address: 00000000000000f8\n[154565.553080] #PF: supervisor read access in kernel mode\n[154565.553082] #PF: error_code(0x0000) - not-present page\n[154565.553084] PGD 80000010488ab067 P4D 80000010488ab067 PUD 104978a067 PMD 0\n[154565.553089] Oops: 0000 1 PREEMPT SMP PTI\n[154565.553092] CPU: 10 PID: 858 Comm: qla2xxx_2_dpc Kdump: loaded Tainted: G OE ------- --- 5.14.0-503.11.1.el9_5.x86_64 #1\n[154565.553096] Hardware name: HPE Synergy 660 Gen10/Synergy 660 Gen10 Compute Module, BIOS I43 09/30/2024\n[154565.553097] RIP: 0010:qla_fab_async_scan.part.0+0x40b/0x870 [qla2xxx]\n[154565.553141] Code: 00 00 e8 58 a3 ec d4 49 89 e9 ba 12 20 00 00 4c 89 e6 49 c7 c0 00 ee a8 c0 48 c7 c1 66 c0 a9 c0 bf 00 80 00 10 e8 15 69 00 00 \u003c4c\u003e 8b 8d f8 00 00 00 4d 85 c9 74 35 49 8b 84 24 00 19 00 00 48 8b\n[154565.553143] RSP: 0018:ffffb4dbc8aebdd0 EFLAGS: 00010286\n[154565.553145] RAX: 0000000000000000 RBX: ffff8ec2cf0908d0 RCX: 0000000000000002\n[154565.553147] RDX: 0000000000000000 RSI: ffffffffc0a9c896 RDI: ffffb4dbc8aebd47\n[154565.553148] RBP: 0000000000000000 R08: ffffb4dbc8aebd45 R09: 0000000000ffff0a\n[154565.553150] R10: 0000000000000000 R11: 000000000000000f R12: ffff8ec2cf0908d0\n[154565.553151] R13: ffff8ec2cf090900 R14: 0000000000000102 R15: ffff8ec2cf084000\n[154565.553152] FS: 0000000000000000(0000) GS:ffff8ed27f800000(0000) knlGS:0000000000000000\n[154565.553154] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[154565.553155] CR2: 00000000000000f8 CR3: 000000113ae0a005 CR4: 00000000007706f0\n[154565.553157] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[154565.553158] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n[154565.553159] PKRU: 55555554\n[154565.553160] Call Trace:\n[154565.553162] \u003cTASK\u003e\n[154565.553165] ? show_trace_log_lvl+0x1c4/0x2df\n[154565.553172] ? show_trace_log_lvl+0x1c4/0x2df\n[154565.553177] ? qla_fab_async_scan.part.0+0x40b/0x870 [qla2xxx]\n[154565.553215] ? __die_body.cold+0x8/0xd\n[154565.553218] ? page_fault_oops+0x134/0x170\n[154565.553223] ? snprintf+0x49/0x70\n[154565.553229] ? exc_page_fault+0x62/0x150\n[154565.553238] ? asm_exc_page_fault+0x22/0x30\n\nCheck for sp being non NULL before freeing any associated memory",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71236",
"url": "https://www.suse.com/security/cve/CVE-2025-71236"
},
{
"category": "external",
"summary": "SUSE Bug 1258442 for CVE-2025-71236",
"url": "https://bugzilla.suse.com/1258442"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-71236"
},
{
"cve": "CVE-2026-22979",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-22979"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: fix memory leak in skb_segment_list for GRO packets\n\nWhen skb_segment_list() is called during packet forwarding, it handles\npackets that were aggregated by the GRO engine.\n\nHistorically, the segmentation logic in skb_segment_list assumes that\nindividual segments are split from a parent SKB and may need to carry\ntheir own socket memory accounting. Accordingly, the code transfers\ntruesize from the parent to the newly created segments.\n\nPrior to commit ed4cccef64c1 (\"gro: fix ownership transfer\"), this\ntruesize subtraction in skb_segment_list() was valid because fragments\nstill carry a reference to the original socket.\n\nHowever, commit ed4cccef64c1 (\"gro: fix ownership transfer\") changed\nthis behavior by ensuring that fraglist entries are explicitly\norphaned (skb-\u003esk = NULL) to prevent illegal orphaning later in the\nstack. This change meant that the entire socket memory charge remained\nwith the head SKB, but the corresponding accounting logic in\nskb_segment_list() was never updated.\n\nAs a result, the current code unconditionally adds each fragment\u0027s\ntruesize to delta_truesize and subtracts it from the parent SKB. Since\nthe fragments are no longer charged to the socket, this subtraction\nresults in an effective under-count of memory when the head is freed.\nThis causes sk_wmem_alloc to remain non-zero, preventing socket\ndestruction and leading to a persistent memory leak.\n\nThe leak can be observed via KMEMLEAK when tearing down the networking\nenvironment:\n\nunreferenced object 0xffff8881e6eb9100 (size 2048):\n comm \"ping\", pid 6720, jiffies 4295492526\n backtrace:\n kmem_cache_alloc_noprof+0x5c6/0x800\n sk_prot_alloc+0x5b/0x220\n sk_alloc+0x35/0xa00\n inet6_create.part.0+0x303/0x10d0\n __sock_create+0x248/0x640\n __sys_socket+0x11b/0x1d0\n\nSince skb_segment_list() is exclusively used for SKB_GSO_FRAGLIST\npackets constructed by GRO, the truesize adjustment is removed.\n\nThe call to skb_release_head_state() must be preserved. As documented in\ncommit cf673ed0e057 (\"net: fix fraglist segmentation reference count\nleak\"), it is still required to correctly drop references to SKB\nextensions that may be overwritten during __copy_skb_header().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-22979",
"url": "https://www.suse.com/security/cve/CVE-2026-22979"
},
{
"category": "external",
"summary": "SUSE Bug 1257228 for CVE-2026-22979",
"url": "https://bugzilla.suse.com/1257228"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2026-22979"
},
{
"cve": "CVE-2026-22982",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-22982"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: mscc: ocelot: Fix crash when adding interface under a lag\n\nCommit 15faa1f67ab4 (\"lan966x: Fix crash when adding interface under a lag\")\nfixed a similar issue in the lan966x driver caused by a NULL pointer dereference.\nThe ocelot_set_aggr_pgids() function in the ocelot driver has similar logic\nand is susceptible to the same crash.\n\nThis issue specifically affects the ocelot_vsc7514.c frontend, which leaves\nunused ports as NULL pointers. The felix_vsc9959.c frontend is unaffected as\nit uses the DSA framework which registers all ports.\n\nFix this by checking if the port pointer is valid before accessing it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-22982",
"url": "https://www.suse.com/security/cve/CVE-2026-22982"
},
{
"category": "external",
"summary": "SUSE Bug 1257179 for CVE-2026-22982",
"url": "https://bugzilla.suse.com/1257179"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2026-22982"
},
{
"cve": "CVE-2026-22998",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-22998"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvme-tcp: fix NULL pointer dereferences in nvmet_tcp_build_pdu_iovec\n\nCommit efa56305908b (\"nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length\")\nadded ttag bounds checking and data_offset\nvalidation in nvmet_tcp_handle_h2c_data_pdu(), but it did not validate\nwhether the command\u0027s data structures (cmd-\u003ereq.sg and cmd-\u003eiov) have\nbeen properly initialized before processing H2C_DATA PDUs.\n\nThe nvmet_tcp_build_pdu_iovec() function dereferences these pointers\nwithout NULL checks. This can be triggered by sending H2C_DATA PDU\nimmediately after the ICREQ/ICRESP handshake, before\nsending a CONNECT command or NVMe write command.\n\nAttack vectors that trigger NULL pointer dereferences:\n1. H2C_DATA PDU sent before CONNECT -\u003e both pointers NULL\n2. H2C_DATA PDU for READ command -\u003e cmd-\u003ereq.sg allocated, cmd-\u003eiov NULL\n3. H2C_DATA PDU for uninitialized command slot -\u003e both pointers NULL\n\nThe fix validates both cmd-\u003ereq.sg and cmd-\u003eiov before calling\nnvmet_tcp_build_pdu_iovec(). Both checks are required because:\n- Uninitialized commands: both NULL\n- READ commands: cmd-\u003ereq.sg allocated, cmd-\u003eiov NULL\n- WRITE commands: both allocated",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-22998",
"url": "https://www.suse.com/security/cve/CVE-2026-22998"
},
{
"category": "external",
"summary": "SUSE Bug 1257209 for CVE-2026-22998",
"url": "https://bugzilla.suse.com/1257209"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2026-22998"
},
{
"cve": "CVE-2026-23003",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23003"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nip6_tunnel: use skb_vlan_inet_prepare() in __ip6_tnl_rcv()\n\nBlamed commit did not take care of VLAN encapsulations\nas spotted by syzbot [1].\n\nUse skb_vlan_inet_prepare() instead of pskb_inet_may_pull().\n\n[1]\n BUG: KMSAN: uninit-value in __INET_ECN_decapsulate include/net/inet_ecn.h:253 [inline]\n BUG: KMSAN: uninit-value in INET_ECN_decapsulate include/net/inet_ecn.h:275 [inline]\n BUG: KMSAN: uninit-value in IP6_ECN_decapsulate+0x7a8/0x1fa0 include/net/inet_ecn.h:321\n __INET_ECN_decapsulate include/net/inet_ecn.h:253 [inline]\n INET_ECN_decapsulate include/net/inet_ecn.h:275 [inline]\n IP6_ECN_decapsulate+0x7a8/0x1fa0 include/net/inet_ecn.h:321\n ip6ip6_dscp_ecn_decapsulate+0x16f/0x1b0 net/ipv6/ip6_tunnel.c:729\n __ip6_tnl_rcv+0xed9/0x1b50 net/ipv6/ip6_tunnel.c:860\n ip6_tnl_rcv+0xc3/0x100 net/ipv6/ip6_tunnel.c:903\n gre_rcv+0x1529/0x1b90 net/ipv6/ip6_gre.c:-1\n ip6_protocol_deliver_rcu+0x1c89/0x2c60 net/ipv6/ip6_input.c:438\n ip6_input_finish+0x1f4/0x4a0 net/ipv6/ip6_input.c:489\n NF_HOOK include/linux/netfilter.h:318 [inline]\n ip6_input+0x9c/0x330 net/ipv6/ip6_input.c:500\n ip6_mc_input+0x7ca/0xc10 net/ipv6/ip6_input.c:590\n dst_input include/net/dst.h:474 [inline]\n ip6_rcv_finish+0x958/0x990 net/ipv6/ip6_input.c:79\n NF_HOOK include/linux/netfilter.h:318 [inline]\n ipv6_rcv+0xf1/0x3c0 net/ipv6/ip6_input.c:311\n __netif_receive_skb_one_core net/core/dev.c:6139 [inline]\n __netif_receive_skb+0x1df/0xac0 net/core/dev.c:6252\n netif_receive_skb_internal net/core/dev.c:6338 [inline]\n netif_receive_skb+0x57/0x630 net/core/dev.c:6397\n tun_rx_batched+0x1df/0x980 drivers/net/tun.c:1485\n tun_get_user+0x5c0e/0x6c60 drivers/net/tun.c:1953\n tun_chr_write_iter+0x3e9/0x5c0 drivers/net/tun.c:1999\n new_sync_write fs/read_write.c:593 [inline]\n vfs_write+0xbe2/0x15d0 fs/read_write.c:686\n ksys_write fs/read_write.c:738 [inline]\n __do_sys_write fs/read_write.c:749 [inline]\n __se_sys_write fs/read_write.c:746 [inline]\n __x64_sys_write+0x1fb/0x4d0 fs/read_write.c:746\n x64_sys_call+0x30ab/0x3e70 arch/x86/include/generated/asm/syscalls_64.h:2\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xd3/0xf80 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nUninit was created at:\n slab_post_alloc_hook mm/slub.c:4960 [inline]\n slab_alloc_node mm/slub.c:5263 [inline]\n kmem_cache_alloc_node_noprof+0x9e7/0x17a0 mm/slub.c:5315\n kmalloc_reserve+0x13c/0x4b0 net/core/skbuff.c:586\n __alloc_skb+0x805/0x1040 net/core/skbuff.c:690\n alloc_skb include/linux/skbuff.h:1383 [inline]\n alloc_skb_with_frags+0xc5/0xa60 net/core/skbuff.c:6712\n sock_alloc_send_pskb+0xacc/0xc60 net/core/sock.c:2995\n tun_alloc_skb drivers/net/tun.c:1461 [inline]\n tun_get_user+0x1142/0x6c60 drivers/net/tun.c:1794\n tun_chr_write_iter+0x3e9/0x5c0 drivers/net/tun.c:1999\n new_sync_write fs/read_write.c:593 [inline]\n vfs_write+0xbe2/0x15d0 fs/read_write.c:686\n ksys_write fs/read_write.c:738 [inline]\n __do_sys_write fs/read_write.c:749 [inline]\n __se_sys_write fs/read_write.c:746 [inline]\n __x64_sys_write+0x1fb/0x4d0 fs/read_write.c:746\n x64_sys_call+0x30ab/0x3e70 arch/x86/include/generated/asm/syscalls_64.h:2\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xd3/0xf80 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nCPU: 0 UID: 0 PID: 6465 Comm: syz.0.17 Not tainted syzkaller #0 PREEMPT(none)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23003",
"url": "https://www.suse.com/security/cve/CVE-2026-23003"
},
{
"category": "external",
"summary": "SUSE Bug 1257246 for CVE-2026-23003",
"url": "https://bugzilla.suse.com/1257246"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2026-23003"
},
{
"cve": "CVE-2026-23004",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23004"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndst: fix races in rt6_uncached_list_del() and rt_del_uncached_list()\n\nsyzbot was able to crash the kernel in rt6_uncached_list_flush_dev()\nin an interesting way [1]\n\nCrash happens in list_del_init()/INIT_LIST_HEAD() while writing\nlist-\u003eprev, while the prior write on list-\u003enext went well.\n\nstatic inline void INIT_LIST_HEAD(struct list_head *list)\n{\n\tWRITE_ONCE(list-\u003enext, list); // This went well\n\tWRITE_ONCE(list-\u003eprev, list); // Crash, @list has been freed.\n}\n\nIssue here is that rt6_uncached_list_del() did not attempt to lock\nul-\u003elock, as list_empty(\u0026rt-\u003edst.rt_uncached) returned\ntrue because the WRITE_ONCE(list-\u003enext, list) happened on the other CPU.\n\nWe might use list_del_init_careful() and list_empty_careful(),\nor make sure rt6_uncached_list_del() always grabs the spinlock\nwhenever rt-\u003edst.rt_uncached_list has been set.\n\nA similar fix is neeed for IPv4.\n\n[1]\n\n BUG: KASAN: slab-use-after-free in INIT_LIST_HEAD include/linux/list.h:46 [inline]\n BUG: KASAN: slab-use-after-free in list_del_init include/linux/list.h:296 [inline]\n BUG: KASAN: slab-use-after-free in rt6_uncached_list_flush_dev net/ipv6/route.c:191 [inline]\n BUG: KASAN: slab-use-after-free in rt6_disable_ip+0x633/0x730 net/ipv6/route.c:5020\nWrite of size 8 at addr ffff8880294cfa78 by task kworker/u8:14/3450\n\nCPU: 0 UID: 0 PID: 3450 Comm: kworker/u8:14 Tainted: G L syzkaller #0 PREEMPT_{RT,(full)}\nTainted: [L]=SOFTLOCKUP\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025\nWorkqueue: netns cleanup_net\nCall Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0xe8/0x150 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:378 [inline]\n print_report+0xca/0x240 mm/kasan/report.c:482\n kasan_report+0x118/0x150 mm/kasan/report.c:595\n INIT_LIST_HEAD include/linux/list.h:46 [inline]\n list_del_init include/linux/list.h:296 [inline]\n rt6_uncached_list_flush_dev net/ipv6/route.c:191 [inline]\n rt6_disable_ip+0x633/0x730 net/ipv6/route.c:5020\n addrconf_ifdown+0x143/0x18a0 net/ipv6/addrconf.c:3853\n addrconf_notify+0x1bc/0x1050 net/ipv6/addrconf.c:-1\n notifier_call_chain+0x19d/0x3a0 kernel/notifier.c:85\n call_netdevice_notifiers_extack net/core/dev.c:2268 [inline]\n call_netdevice_notifiers net/core/dev.c:2282 [inline]\n netif_close_many+0x29c/0x410 net/core/dev.c:1785\n unregister_netdevice_many_notify+0xb50/0x2330 net/core/dev.c:12353\n ops_exit_rtnl_list net/core/net_namespace.c:187 [inline]\n ops_undo_list+0x3dc/0x990 net/core/net_namespace.c:248\n cleanup_net+0x4de/0x7b0 net/core/net_namespace.c:696\n process_one_work kernel/workqueue.c:3257 [inline]\n process_scheduled_works+0xad1/0x1770 kernel/workqueue.c:3340\n worker_thread+0x8a0/0xda0 kernel/workqueue.c:3421\n kthread+0x711/0x8a0 kernel/kthread.c:463\n ret_from_fork+0x510/0xa50 arch/x86/kernel/process.c:158\n ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:246\n \u003c/TASK\u003e\n\nAllocated by task 803:\n kasan_save_stack mm/kasan/common.c:57 [inline]\n kasan_save_track+0x3e/0x80 mm/kasan/common.c:78\n unpoison_slab_object mm/kasan/common.c:340 [inline]\n __kasan_slab_alloc+0x6c/0x80 mm/kasan/common.c:366\n kasan_slab_alloc include/linux/kasan.h:253 [inline]\n slab_post_alloc_hook mm/slub.c:4953 [inline]\n slab_alloc_node mm/slub.c:5263 [inline]\n kmem_cache_alloc_noprof+0x18d/0x6c0 mm/slub.c:5270\n dst_alloc+0x105/0x170 net/core/dst.c:89\n ip6_dst_alloc net/ipv6/route.c:342 [inline]\n icmp6_dst_alloc+0x75/0x460 net/ipv6/route.c:3333\n mld_sendpack+0x683/0xe60 net/ipv6/mcast.c:1844\n mld_send_cr net/ipv6/mcast.c:2154 [inline]\n mld_ifc_work+0x83e/0xd60 net/ipv6/mcast.c:2693\n process_one_work kernel/workqueue.c:3257 [inline]\n process_scheduled_works+0xad1/0x1770 kernel/workqueue.c:3340\n worker_thread+0x8a0/0xda0 kernel/workqueue.c:3421\n kthread+0x711/0x8a0 kernel/kthread.c:463\n ret_from_fork+0x510/0xa50 arch/x86/kernel/process.c:158\n ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entr\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23004",
"url": "https://www.suse.com/security/cve/CVE-2026-23004"
},
{
"category": "external",
"summary": "SUSE Bug 1257231 for CVE-2026-23004",
"url": "https://bugzilla.suse.com/1257231"
},
{
"category": "external",
"summary": "SUSE Bug 1258655 for CVE-2026-23004",
"url": "https://bugzilla.suse.com/1258655"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "important"
}
],
"title": "CVE-2026-23004"
},
{
"cve": "CVE-2026-23017",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23017"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nidpf: fix error handling in the init_task on load\n\nIf the init_task fails during a driver load, we end up without vports and\nnetdevs, effectively failing the entire process. In that state a\nsubsequent reset will result in a crash as the service task attempts to\naccess uninitialized resources. Following trace is from an error in the\ninit_task where the CREATE_VPORT (op 501) is rejected by the FW:\n\n[40922.763136] idpf 0000:83:00.0: Device HW Reset initiated\n[40924.449797] idpf 0000:83:00.0: Transaction failed (op 501)\n[40958.148190] idpf 0000:83:00.0: HW reset detected\n[40958.161202] BUG: kernel NULL pointer dereference, address: 00000000000000a8\n...\n[40958.168094] Workqueue: idpf-0000:83:00.0-vc_event idpf_vc_event_task [idpf]\n[40958.168865] RIP: 0010:idpf_vc_event_task+0x9b/0x350 [idpf]\n...\n[40958.177932] Call Trace:\n[40958.178491] \u003cTASK\u003e\n[40958.179040] process_one_work+0x226/0x6d0\n[40958.179609] worker_thread+0x19e/0x340\n[40958.180158] ? __pfx_worker_thread+0x10/0x10\n[40958.180702] kthread+0x10f/0x250\n[40958.181238] ? __pfx_kthread+0x10/0x10\n[40958.181774] ret_from_fork+0x251/0x2b0\n[40958.182307] ? __pfx_kthread+0x10/0x10\n[40958.182834] ret_from_fork_asm+0x1a/0x30\n[40958.183370] \u003c/TASK\u003e\n\nFix the error handling in the init_task to make sure the service and\nmailbox tasks are disabled if the error happens during load. These are\nstarted in idpf_vc_core_init(), which spawns the init_task and has no way\nof knowing if it failed. If the error happens on reset, following\nsuccessful driver load, the tasks can still run, as that will allow the\nnetdevs to attempt recovery through another reset. Stop the PTP callbacks\neither way as those will be restarted by the call to idpf_vc_core_init()\nduring a successful reset.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23017",
"url": "https://www.suse.com/security/cve/CVE-2026-23017"
},
{
"category": "external",
"summary": "SUSE Bug 1257552 for CVE-2026-23017",
"url": "https://bugzilla.suse.com/1257552"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2026-23017"
},
{
"cve": "CVE-2026-23021",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23021"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: pegasus: fix memory leak in update_eth_regs_async()\n\nWhen asynchronously writing to the device registers and if usb_submit_urb()\nfail, the code fail to release allocated to this point resources.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23021",
"url": "https://www.suse.com/security/cve/CVE-2026-23021"
},
{
"category": "external",
"summary": "SUSE Bug 1257557 for CVE-2026-23021",
"url": "https://bugzilla.suse.com/1257557"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2026-23021"
},
{
"cve": "CVE-2026-23026",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23026"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: qcom: gpi: Fix memory leak in gpi_peripheral_config()\n\nFix a memory leak in gpi_peripheral_config() where the original memory\npointed to by gchan-\u003econfig could be lost if krealloc() fails.\n\nThe issue occurs when:\n1. gchan-\u003econfig points to previously allocated memory\n2. krealloc() fails and returns NULL\n3. The function directly assigns NULL to gchan-\u003econfig, losing the\n reference to the original memory\n4. The original memory becomes unreachable and cannot be freed\n\nFix this by using a temporary variable to hold the krealloc() result\nand only updating gchan-\u003econfig when the allocation succeeds.\n\nFound via static analysis and code review.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23026",
"url": "https://www.suse.com/security/cve/CVE-2026-23026"
},
{
"category": "external",
"summary": "SUSE Bug 1257562 for CVE-2026-23026",
"url": "https://bugzilla.suse.com/1257562"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2026-23026"
},
{
"cve": "CVE-2026-23033",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23033"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: omap-dma: fix dma_pool resource leak in error paths\n\nThe dma_pool created by dma_pool_create() is not destroyed when\ndma_async_device_register() or of_dma_controller_register() fails,\ncausing a resource leak in the probe error paths.\n\nAdd dma_pool_destroy() in both error paths to properly release the\nallocated dma_pool resource.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23033",
"url": "https://www.suse.com/security/cve/CVE-2026-23033"
},
{
"category": "external",
"summary": "SUSE Bug 1257570 for CVE-2026-23033",
"url": "https://bugzilla.suse.com/1257570"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "low"
}
],
"title": "CVE-2026-23033"
},
{
"cve": "CVE-2026-23035",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23035"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5e: Pass netdev to mlx5e_destroy_netdev instead of priv\n\nmlx5e_priv is an unstable structure that can be memset(0) if profile\nattaching fails.\n\nPass netdev to mlx5e_destroy_netdev() to guarantee it will work on a\nvalid netdev.\n\nOn mlx5e_remove: Check validity of priv-\u003eprofile, before attempting\nto cleanup any resources that might be not there.\n\nThis fixes a kernel oops in mlx5e_remove when switchdev mode fails due\nto change profile failure.\n\n$ devlink dev eswitch set pci/0000:00:03.0 mode switchdev\nError: mlx5_core: Failed setting eswitch to offloads.\ndmesg:\nworkqueue: Failed to create a rescuer kthread for wq \"mlx5e\": -EINTR\nmlx5_core 0012:03:00.1: mlx5e_netdev_init_profile:6214:(pid 37199): mlx5e_priv_init failed, err=-12\nmlx5_core 0012:03:00.1 gpu3rdma1: mlx5e_netdev_change_profile: new profile init failed, -12\nworkqueue: Failed to create a rescuer kthread for wq \"mlx5e\": -EINTR\nmlx5_core 0012:03:00.1: mlx5e_netdev_init_profile:6214:(pid 37199): mlx5e_priv_init failed, err=-12\nmlx5_core 0012:03:00.1 gpu3rdma1: mlx5e_netdev_change_profile: failed to rollback to orig profile, -12\n\n$ devlink dev reload pci/0000:00:03.0 ==\u003e oops\n\nBUG: kernel NULL pointer dereference, address: 0000000000000370\nPGD 0 P4D 0\nOops: Oops: 0000 [#1] SMP NOPTI\nCPU: 15 UID: 0 PID: 520 Comm: devlink Not tainted 6.18.0-rc5+ #115 PREEMPT(voluntary)\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-2.fc40 04/01/2014\nRIP: 0010:mlx5e_dcbnl_dscp_app+0x23/0x100\nRSP: 0018:ffffc9000083f8b8 EFLAGS: 00010286\nRAX: ffff8881126fc380 RBX: ffff8881015ac400 RCX: ffffffff826ffc45\nRDX: 0000000000000000 RSI: 0000000000000001 RDI: ffff8881035109c0\nRBP: ffff8881035109c0 R08: ffff888101e3e838 R09: ffff888100264e10\nR10: ffffc9000083f898 R11: ffffc9000083f8a0 R12: ffff888101b921a0\nR13: ffff888101b921a0 R14: ffff8881015ac9a0 R15: ffff8881015ac400\nFS: 00007f789a3c8740(0000) GS:ffff88856aa59000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000000000000370 CR3: 000000010b6c0001 CR4: 0000000000370ef0\nCall Trace:\n \u003cTASK\u003e\n mlx5e_remove+0x57/0x110\n device_release_driver_internal+0x19c/0x200\n bus_remove_device+0xc6/0x130\n device_del+0x160/0x3d0\n ? devl_param_driverinit_value_get+0x2d/0x90\n mlx5_detach_device+0x89/0xe0\n mlx5_unload_one_devl_locked+0x3a/0x70\n mlx5_devlink_reload_down+0xc8/0x220\n devlink_reload+0x7d/0x260\n devlink_nl_reload_doit+0x45b/0x5a0\n genl_family_rcv_msg_doit+0xe8/0x140",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23035",
"url": "https://www.suse.com/security/cve/CVE-2026-23035"
},
{
"category": "external",
"summary": "SUSE Bug 1257559 for CVE-2026-23035",
"url": "https://bugzilla.suse.com/1257559"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2026-23035"
},
{
"cve": "CVE-2026-23037",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23037"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: etas_es58x: allow partial RX URB allocation to succeed\n\nWhen es58x_alloc_rx_urbs() fails to allocate the requested number of\nURBs but succeeds in allocating some, it returns an error code.\nThis causes es58x_open() to return early, skipping the cleanup label\n\u0027free_urbs\u0027, which leads to the anchored URBs being leaked.\n\nAs pointed out by maintainer Vincent Mailhol, the driver is designed\nto handle partial URB allocation gracefully. Therefore, partial\nallocation should not be treated as a fatal error.\n\nModify es58x_alloc_rx_urbs() to return 0 if at least one URB has been\nallocated, restoring the intended behavior and preventing the leak\nin es58x_open().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23037",
"url": "https://www.suse.com/security/cve/CVE-2026-23037"
},
{
"category": "external",
"summary": "SUSE Bug 1257554 for CVE-2026-23037",
"url": "https://bugzilla.suse.com/1257554"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "low"
}
],
"title": "CVE-2026-23037"
},
{
"cve": "CVE-2026-23049",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23049"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/panel-simple: fix connector type for DataImage SCF0700C48GGU18 panel\n\nThe connector type for the DataImage SCF0700C48GGU18 panel is missing and\ndevm_drm_panel_bridge_add() requires connector type to be set. This leads\nto a warning and a backtrace in the kernel log and panel does not work:\n\"\nWARNING: CPU: 3 PID: 38 at drivers/gpu/drm/bridge/panel.c:379 devm_drm_of_get_bridge+0xac/0xb8\n\"\nThe warning is triggered by a check for valid connector type in\ndevm_drm_panel_bridge_add(). If there is no valid connector type\nset for a panel, the warning is printed and panel is not added.\nFill in the missing connector type to fix the warning and make\nthe panel operational once again.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23049",
"url": "https://www.suse.com/security/cve/CVE-2026-23049"
},
{
"category": "external",
"summary": "SUSE Bug 1257723 for CVE-2026-23049",
"url": "https://bugzilla.suse.com/1257723"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2026-23049"
},
{
"cve": "CVE-2026-23053",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23053"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFS: Fix a deadlock involving nfs_release_folio()\n\nWang Zhaolong reports a deadlock involving NFSv4.1 state recovery\nwaiting on kthreadd, which is attempting to reclaim memory by calling\nnfs_release_folio(). The latter cannot make progress due to state\nrecovery being needed.\n\nIt seems that the only safe thing to do here is to kick off a writeback\nof the folio, without waiting for completion, or else kicking off an\nasynchronous commit.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23053",
"url": "https://www.suse.com/security/cve/CVE-2026-23053"
},
{
"category": "external",
"summary": "SUSE Bug 1257718 for CVE-2026-23053",
"url": "https://bugzilla.suse.com/1257718"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2026-23053"
},
{
"cve": "CVE-2026-23056",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23056"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nuacce: implement mremap in uacce_vm_ops to return -EPERM\n\nThe current uacce_vm_ops does not support the mremap operation of\nvm_operations_struct. Implement .mremap to return -EPERM to remind\nusers.\n\nThe reason we need to explicitly disable mremap is that when the\ndriver does not implement .mremap, it uses the default mremap\nmethod. This could lead to a risk scenario:\n\nAn application might first mmap address p1, then mremap to p2,\nfollowed by munmap(p1), and finally munmap(p2). Since the default\nmremap copies the original vma\u0027s vm_private_data (i.e., q) to the\nnew vma, both munmap operations would trigger vma_close, causing\nq-\u003eqfr to be freed twice(qfr will be set to null here, so repeated\nrelease is ok).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23056",
"url": "https://www.suse.com/security/cve/CVE-2026-23056"
},
{
"category": "external",
"summary": "SUSE Bug 1257729 for CVE-2026-23056",
"url": "https://bugzilla.suse.com/1257729"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2026-23056"
},
{
"cve": "CVE-2026-23057",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23057"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvsock/virtio: Coalesce only linear skb\n\nvsock/virtio common tries to coalesce buffers in rx queue: if a linear skb\n(with a spare tail room) is followed by a small skb (length limited by\nGOOD_COPY_LEN = 128), an attempt is made to join them.\n\nSince the introduction of MSG_ZEROCOPY support, assumption that a small skb\nwill always be linear is incorrect. In the zerocopy case, data is lost and\nthe linear skb is appended with uninitialized kernel memory.\n\nOf all 3 supported virtio-based transports, only loopback-transport is\naffected. G2H virtio-transport rx queue operates on explicitly linear skbs;\nsee virtio_vsock_alloc_linear_skb() in virtio_vsock_rx_fill(). H2G\nvhost-transport may allocate non-linear skbs, but only for sizes that are\nnot considered for coalescence; see PAGE_ALLOC_COSTLY_ORDER in\nvirtio_vsock_alloc_skb().\n\nEnsure only linear skbs are coalesced. Note that skb_tailroom(last_skb) \u003e 0\nguarantees last_skb is linear.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23057",
"url": "https://www.suse.com/security/cve/CVE-2026-23057"
},
{
"category": "external",
"summary": "SUSE Bug 1257740 for CVE-2026-23057",
"url": "https://bugzilla.suse.com/1257740"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2026-23057"
},
{
"cve": "CVE-2026-23058",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23058"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: ems_usb: ems_usb_read_bulk_callback(): fix URB memory leak\n\nFix similar memory leak as in commit 7352e1d5932a (\"can: gs_usb:\ngs_usb_receive_bulk_callback(): fix URB memory leak\").\n\nIn ems_usb_open(), the URBs for USB-in transfers are allocated, added to\nthe dev-\u003erx_submitted anchor and submitted. In the complete callback\nems_usb_read_bulk_callback(), the URBs are processed and resubmitted. In\nems_usb_close() the URBs are freed by calling\nusb_kill_anchored_urbs(\u0026dev-\u003erx_submitted).\n\nHowever, this does not take into account that the USB framework unanchors\nthe URB before the complete function is called. This means that once an\nin-URB has been completed, it is no longer anchored and is ultimately not\nreleased in ems_usb_close().\n\nFix the memory leak by anchoring the URB in the\nems_usb_read_bulk_callback() to the dev-\u003erx_submitted anchor.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23058",
"url": "https://www.suse.com/security/cve/CVE-2026-23058"
},
{
"category": "external",
"summary": "SUSE Bug 1257739 for CVE-2026-23058",
"url": "https://bugzilla.suse.com/1257739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "low"
}
],
"title": "CVE-2026-23058"
},
{
"cve": "CVE-2026-23060",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23060"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: authencesn - reject too-short AAD (assoclen\u003c8) to match ESP/ESN spec\n\nauthencesn assumes an ESP/ESN-formatted AAD. When assoclen is shorter than\nthe minimum expected length, crypto_authenc_esn_decrypt() can advance past\nthe end of the destination scatterlist and trigger a NULL pointer dereference\nin scatterwalk_map_and_copy(), leading to a kernel panic (DoS).\n\nAdd a minimum AAD length check to fail fast on invalid inputs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23060",
"url": "https://www.suse.com/security/cve/CVE-2026-23060"
},
{
"category": "external",
"summary": "SUSE Bug 1257735 for CVE-2026-23060",
"url": "https://bugzilla.suse.com/1257735"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2026-23060"
},
{
"cve": "CVE-2026-23061",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23061"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: kvaser_usb: kvaser_usb_read_bulk_callback(): fix URB memory leak\n\nFix similar memory leak as in commit 7352e1d5932a (\"can: gs_usb:\ngs_usb_receive_bulk_callback(): fix URB memory leak\").\n\nIn kvaser_usb_set_{,data_}bittiming() -\u003e kvaser_usb_setup_rx_urbs(), the\nURBs for USB-in transfers are allocated, added to the dev-\u003erx_submitted\nanchor and submitted. In the complete callback\nkvaser_usb_read_bulk_callback(), the URBs are processed and resubmitted. In\nkvaser_usb_remove_interfaces() the URBs are freed by calling\nusb_kill_anchored_urbs(\u0026dev-\u003erx_submitted).\n\nHowever, this does not take into account that the USB framework unanchors\nthe URB before the complete function is called. This means that once an\nin-URB has been completed, it is no longer anchored and is ultimately not\nreleased in usb_kill_anchored_urbs().\n\nFix the memory leak by anchoring the URB in the\nkvaser_usb_read_bulk_callback() to the dev-\u003erx_submitted anchor.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23061",
"url": "https://www.suse.com/security/cve/CVE-2026-23061"
},
{
"category": "external",
"summary": "SUSE Bug 1257776 for CVE-2026-23061",
"url": "https://bugzilla.suse.com/1257776"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2026-23061"
},
{
"cve": "CVE-2026-23063",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23063"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nuacce: ensure safe queue release with state management\n\nDirectly calling `put_queue` carries risks since it cannot\nguarantee that resources of `uacce_queue` have been fully released\nbeforehand. So adding a `stop_queue` operation for the\nUACCE_CMD_PUT_Q command and leaving the `put_queue` operation to\nthe final resource release ensures safety.\n\nQueue states are defined as follows:\n- UACCE_Q_ZOMBIE: Initial state\n- UACCE_Q_INIT: After opening `uacce`\n- UACCE_Q_STARTED: After `start` is issued via `ioctl`\n\nWhen executing `poweroff -f` in virt while accelerator are still\nworking, `uacce_fops_release` and `uacce_remove` may execute\nconcurrently. This can cause `uacce_put_queue` within\n`uacce_fops_release` to access a NULL `ops` pointer. Therefore, add\nstate checks to prevent accessing freed pointers.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23063",
"url": "https://www.suse.com/security/cve/CVE-2026-23063"
},
{
"category": "external",
"summary": "SUSE Bug 1257722 for CVE-2026-23063",
"url": "https://bugzilla.suse.com/1257722"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2026-23063"
},
{
"cve": "CVE-2026-23064",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23064"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: act_ife: avoid possible NULL deref\n\ntcf_ife_encode() must make sure ife_encode() does not return NULL.\n\nsyzbot reported:\n\nOops: general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] SMP KASAN NOPTI\nKASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]\n RIP: 0010:ife_tlv_meta_encode+0x41/0xa0 net/ife/ife.c:166\nCPU: 3 UID: 0 PID: 8990 Comm: syz.0.696 Not tainted syzkaller #0 PREEMPT(full)\nCall Trace:\n \u003cTASK\u003e\n ife_encode_meta_u32+0x153/0x180 net/sched/act_ife.c:101\n tcf_ife_encode net/sched/act_ife.c:841 [inline]\n tcf_ife_act+0x1022/0x1de0 net/sched/act_ife.c:877\n tc_act include/net/tc_wrapper.h:130 [inline]\n tcf_action_exec+0x1c0/0xa20 net/sched/act_api.c:1152\n tcf_exts_exec include/net/pkt_cls.h:349 [inline]\n mall_classify+0x1a0/0x2a0 net/sched/cls_matchall.c:42\n tc_classify include/net/tc_wrapper.h:197 [inline]\n __tcf_classify net/sched/cls_api.c:1764 [inline]\n tcf_classify+0x7f2/0x1380 net/sched/cls_api.c:1860\n multiq_classify net/sched/sch_multiq.c:39 [inline]\n multiq_enqueue+0xe0/0x510 net/sched/sch_multiq.c:66\n dev_qdisc_enqueue+0x45/0x250 net/core/dev.c:4147\n __dev_xmit_skb net/core/dev.c:4262 [inline]\n __dev_queue_xmit+0x2998/0x46c0 net/core/dev.c:4798",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23064",
"url": "https://www.suse.com/security/cve/CVE-2026-23064"
},
{
"category": "external",
"summary": "SUSE Bug 1257765 for CVE-2026-23064",
"url": "https://bugzilla.suse.com/1257765"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2026-23064"
},
{
"cve": "CVE-2026-23068",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23068"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nspi: spi-sprd-adi: Fix double free in probe error path\n\nThe driver currently uses spi_alloc_host() to allocate the controller\nbut registers it using devm_spi_register_controller().\n\nIf devm_register_restart_handler() fails, the code jumps to the\nput_ctlr label and calls spi_controller_put(). However, since the\ncontroller was registered via a devm function, the device core will\nautomatically call spi_controller_put() again when the probe fails.\nThis results in a double-free of the spi_controller structure.\n\nFix this by switching to devm_spi_alloc_host() and removing the\nmanual spi_controller_put() call.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23068",
"url": "https://www.suse.com/security/cve/CVE-2026-23068"
},
{
"category": "external",
"summary": "SUSE Bug 1257805 for CVE-2026-23068",
"url": "https://bugzilla.suse.com/1257805"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2026-23068"
},
{
"cve": "CVE-2026-23071",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23071"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nregmap: Fix race condition in hwspinlock irqsave routine\n\nPreviously, the address of the shared member \u0027\u0026map-\u003espinlock_flags\u0027 was\npassed directly to \u0027hwspin_lock_timeout_irqsave\u0027. This creates a race\ncondition where multiple contexts contending for the lock could overwrite\nthe shared flags variable, potentially corrupting the state for the\ncurrent lock owner.\n\nFix this by using a local stack variable \u0027flags\u0027 to store the IRQ state\ntemporarily.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23071",
"url": "https://www.suse.com/security/cve/CVE-2026-23071"
},
{
"category": "external",
"summary": "SUSE Bug 1257706 for CVE-2026-23071",
"url": "https://bugzilla.suse.com/1257706"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2026-23071"
},
{
"cve": "CVE-2026-23073",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23073"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: rsi: Fix memory corruption due to not set vif driver data size\n\nThe struct ieee80211_vif contains trailing space for vif driver data,\nwhen struct ieee80211_vif is allocated, the total memory size that is\nallocated is sizeof(struct ieee80211_vif) + size of vif driver data.\nThe size of vif driver data is set by each WiFi driver as needed.\n\nThe RSI911x driver does not set vif driver data size, no trailing space\nfor vif driver data is therefore allocated past struct ieee80211_vif .\nThe RSI911x driver does however use the vif driver data to store its\nvif driver data structure \"struct vif_priv\". An access to vif-\u003edrv_priv\nleads to access out of struct ieee80211_vif bounds and corruption of\nsome memory.\n\nIn case of the failure observed locally, rsi_mac80211_add_interface()\nwould write struct vif_priv *vif_info = (struct vif_priv *)vif-\u003edrv_priv;\nvif_info-\u003evap_id = vap_idx. This write corrupts struct fq_tin member\nstruct list_head new_flows . The flow = list_first_entry(head, struct\nfq_flow, flowchain); in fq_tin_reset() then reports non-NULL bogus\naddress, which when accessed causes a crash.\n\nThe trigger is very simple, boot the machine with init=/bin/sh , mount\ndevtmpfs, sysfs, procfs, and then do \"ip link set wlan0 up\", \"sleep 1\",\n\"ip link set wlan0 down\" and the crash occurs.\n\nFix this by setting the correct size of vif driver data, which is the\nsize of \"struct vif_priv\", so that memory is allocated and the driver\ncan store its driver data in it, instead of corrupting memory around\nit.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23073",
"url": "https://www.suse.com/security/cve/CVE-2026-23073"
},
{
"category": "external",
"summary": "SUSE Bug 1257707 for CVE-2026-23073",
"url": "https://bugzilla.suse.com/1257707"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2026-23073"
},
{
"cve": "CVE-2026-23074",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23074"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: Enforce that teql can only be used as root qdisc\n\nDesign intent of teql is that it is only supposed to be used as root qdisc.\nWe need to check for that constraint.\n\nAlthough not important, I will describe the scenario that unearthed this\nissue for the curious.\n\nGangMin Kim \u003ckm.kim1503@gmail.com\u003e managed to concot a scenario as follows:\n\nROOT qdisc 1:0 (QFQ)\n \u251c\u2500\u2500 class 1:1 (weight=15, lmax=16384) netem with delay 6.4s\n \u2500\u2500 class 1:2 (weight=1, lmax=1514) teql\n\nGangMin sends a packet which is enqueued to 1:1 (netem).\nAny invocation of dequeue by QFQ from this class will not return a packet\nuntil after 6.4s. In the meantime, a second packet is sent and it lands on\n1:2. teql\u0027s enqueue will return success and this will activate class 1:2.\nMain issue is that teql only updates the parent visible qlen (sch-\u003eq.qlen)\nat dequeue. Since QFQ will only call dequeue if peek succeeds (and teql\u0027s\npeek always returns NULL), dequeue will never be called and thus the qlen\nwill remain as 0. With that in mind, when GangMin updates 1:2\u0027s lmax value,\nthe qfq_change_class calls qfq_deact_rm_from_agg. Since the child qdisc\u0027s\nqlen was not incremented, qfq fails to deactivate the class, but still\nfrees its pointers from the aggregate. So when the first packet is\nrescheduled after 6.4 seconds (netem\u0027s delay), a dangling pointer is\naccessed causing GangMin\u0027s causing a UAF.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23074",
"url": "https://www.suse.com/security/cve/CVE-2026-23074"
},
{
"category": "external",
"summary": "SUSE Bug 1257749 for CVE-2026-23074",
"url": "https://bugzilla.suse.com/1257749"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "important"
}
],
"title": "CVE-2026-23074"
},
{
"cve": "CVE-2026-23076",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23076"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: ctxfi: Fix potential OOB access in audio mixer handling\n\nIn the audio mixer handling code of ctxfi driver, the conf field is\nused as a kind of loop index, and it\u0027s referred in the index callbacks\n(amixer_index() and sum_index()).\n\nAs spotted recently by fuzzers, the current code causes OOB access at\nthose functions.\n| UBSAN: array-index-out-of-bounds in /build/reproducible-path/linux-6.17.8/sound/pci/ctxfi/ctamixer.c:347:48\n| index 8 is out of range for type \u0027unsigned char [8]\u0027\n\nAfter the analysis, the cause was found to be the lack of the proper\n(re-)initialization of conj field.\n\nThis patch addresses those OOB accesses by adding the proper\ninitializations of the loop indices.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23076",
"url": "https://www.suse.com/security/cve/CVE-2026-23076"
},
{
"category": "external",
"summary": "SUSE Bug 1257788 for CVE-2026-23076",
"url": "https://bugzilla.suse.com/1257788"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2026-23076"
},
{
"cve": "CVE-2026-23078",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23078"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: scarlett2: Fix buffer overflow in config retrieval\n\nThe scarlett2_usb_get_config() function has a logic error in the\nendianness conversion code that can cause buffer overflows when\ncount \u003e 1.\n\nThe code checks `if (size == 2)` where `size` is the total buffer size in\nbytes, then loops `count` times treating each element as u16 (2 bytes).\nThis causes the loop to access `count * 2` bytes when the buffer only\nhas `size` bytes allocated.\n\nFix by checking the element size (config_item-\u003esize) instead of the\ntotal buffer size. This ensures the endianness conversion matches the\nactual element type.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23078",
"url": "https://www.suse.com/security/cve/CVE-2026-23078"
},
{
"category": "external",
"summary": "SUSE Bug 1257789 for CVE-2026-23078",
"url": "https://bugzilla.suse.com/1257789"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2026-23078"
},
{
"cve": "CVE-2026-23080",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23080"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: mcba_usb: mcba_usb_read_bulk_callback(): fix URB memory leak\n\nFix similar memory leak as in commit 7352e1d5932a (\"can: gs_usb:\ngs_usb_receive_bulk_callback(): fix URB memory leak\").\n\nIn mcba_usb_probe() -\u003e mcba_usb_start(), the URBs for USB-in transfers are\nallocated, added to the priv-\u003erx_submitted anchor and submitted. In the\ncomplete callback mcba_usb_read_bulk_callback(), the URBs are processed and\nresubmitted. In mcba_usb_close() -\u003e mcba_urb_unlink() the URBs are freed by\ncalling usb_kill_anchored_urbs(\u0026priv-\u003erx_submitted).\n\nHowever, this does not take into account that the USB framework unanchors\nthe URB before the complete function is called. This means that once an\nin-URB has been completed, it is no longer anchored and is ultimately not\nreleased in usb_kill_anchored_urbs().\n\nFix the memory leak by anchoring the URB in the\nmcba_usb_read_bulk_callback()to the priv-\u003erx_submitted anchor.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23080",
"url": "https://www.suse.com/security/cve/CVE-2026-23080"
},
{
"category": "external",
"summary": "SUSE Bug 1257714 for CVE-2026-23080",
"url": "https://bugzilla.suse.com/1257714"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2026-23080"
},
{
"cve": "CVE-2026-23082",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23082"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: gs_usb: gs_usb_receive_bulk_callback(): unanchor URL on usb_submit_urb() error\n\nIn commit 7352e1d5932a (\"can: gs_usb: gs_usb_receive_bulk_callback(): fix\nURB memory leak\"), the URB was re-anchored before usb_submit_urb() in\ngs_usb_receive_bulk_callback() to prevent a leak of this URB during\ncleanup.\n\nHowever, this patch did not take into account that usb_submit_urb() could\nfail. The URB remains anchored and\nusb_kill_anchored_urbs(\u0026parent-\u003erx_submitted) in gs_can_close() loops\ninfinitely since the anchor list never becomes empty.\n\nTo fix the bug, unanchor the URB when an usb_submit_urb() error occurs,\nalso print an info message.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23082",
"url": "https://www.suse.com/security/cve/CVE-2026-23082"
},
{
"category": "external",
"summary": "SUSE Bug 1257715 for CVE-2026-23082",
"url": "https://bugzilla.suse.com/1257715"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2026-23082"
},
{
"cve": "CVE-2026-23083",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23083"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfou: Don\u0027t allow 0 for FOU_ATTR_IPPROTO.\n\nfou_udp_recv() has the same problem mentioned in the previous\npatch.\n\nIf FOU_ATTR_IPPROTO is set to 0, skb is not freed by\nfou_udp_recv() nor \"resubmit\"-ted in ip_protocol_deliver_rcu().\n\nLet\u0027s forbid 0 for FOU_ATTR_IPPROTO.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23083",
"url": "https://www.suse.com/security/cve/CVE-2026-23083"
},
{
"category": "external",
"summary": "SUSE Bug 1257745 for CVE-2026-23083",
"url": "https://bugzilla.suse.com/1257745"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "low"
}
],
"title": "CVE-2026-23083"
},
{
"cve": "CVE-2026-23084",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23084"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbe2net: Fix NULL pointer dereference in be_cmd_get_mac_from_list\n\nWhen the parameter pmac_id_valid argument of be_cmd_get_mac_from_list() is\nset to false, the driver may request the PMAC_ID from the firmware of the\nnetwork card, and this function will store that PMAC_ID at the provided\naddress pmac_id. This is the contract of this function.\n\nHowever, there is a location within the driver where both\npmac_id_valid == false and pmac_id == NULL are being passed. This could\nresult in dereferencing a NULL pointer.\n\nTo resolve this issue, it is necessary to pass the address of a stub\nvariable to the function.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23084",
"url": "https://www.suse.com/security/cve/CVE-2026-23084"
},
{
"category": "external",
"summary": "SUSE Bug 1257830 for CVE-2026-23084",
"url": "https://bugzilla.suse.com/1257830"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2026-23084"
},
{
"cve": "CVE-2026-23085",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23085"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nirqchip/gic-v3-its: Avoid truncating memory addresses\n\nOn 32-bit machines with CONFIG_ARM_LPAE, it is possible for lowmem\nallocations to be backed by addresses physical memory above the 32-bit\naddress limit, as found while experimenting with larger VMSPLIT\nconfigurations.\n\nThis caused the qemu virt model to crash in the GICv3 driver, which\nallocates the \u0027itt\u0027 object using GFP_KERNEL. Since all memory below\nthe 4GB physical address limit is in ZONE_DMA in this configuration,\nkmalloc() defaults to higher addresses for ZONE_NORMAL, and the\nITS driver stores the physical address in a 32-bit \u0027unsigned long\u0027\nvariable.\n\nChange the itt_addr variable to the correct phys_addr_t type instead,\nalong with all other variables in this driver that hold a physical\naddress.\n\nThe gicv5 driver correctly uses u64 variables, while all other irqchip\ndrivers don\u0027t call virt_to_phys or similar interfaces. It\u0027s expected that\nother device drivers have similar issues, but fixing this one is\nsufficient for booting a virtio based guest.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23085",
"url": "https://www.suse.com/security/cve/CVE-2026-23085"
},
{
"category": "external",
"summary": "SUSE Bug 1257758 for CVE-2026-23085",
"url": "https://bugzilla.suse.com/1257758"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2026-23085"
},
{
"cve": "CVE-2026-23086",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23086"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvsock/virtio: cap TX credit to local buffer size\n\nThe virtio transports derives its TX credit directly from peer_buf_alloc,\nwhich is set from the remote endpoint\u0027s SO_VM_SOCKETS_BUFFER_SIZE value.\n\nOn the host side this means that the amount of data we are willing to\nqueue for a connection is scaled by a guest-chosen buffer size, rather\nthan the host\u0027s own vsock configuration. A malicious guest can advertise\na large buffer and read slowly, causing the host to allocate a\ncorrespondingly large amount of sk_buff memory.\nThe same thing would happen in the guest with a malicious host, since\nvirtio transports share the same code base.\n\nIntroduce a small helper, virtio_transport_tx_buf_size(), that\nreturns min(peer_buf_alloc, buf_alloc), and use it wherever we consume\npeer_buf_alloc.\n\nThis ensures the effective TX window is bounded by both the peer\u0027s\nadvertised buffer and our own buf_alloc (already clamped to\nbuffer_max_size via SO_VM_SOCKETS_BUFFER_MAX_SIZE), so a remote peer\ncannot force the other to queue more data than allowed by its own\nvsock settings.\n\nOn an unpatched Ubuntu 22.04 host (~64 GiB RAM), running a PoC with\n32 guest vsock connections advertising 2 GiB each and reading slowly\ndrove Slab/SUnreclaim from ~0.5 GiB to ~57 GiB; the system only\nrecovered after killing the QEMU process. That said, if QEMU memory is\nlimited with cgroups, the maximum memory used will be limited.\n\nWith this patch applied:\n\n Before:\n MemFree: ~61.6 GiB\n Slab: ~142 MiB\n SUnreclaim: ~117 MiB\n\n After 32 high-credit connections:\n MemFree: ~61.5 GiB\n Slab: ~178 MiB\n SUnreclaim: ~152 MiB\n\nOnly ~35 MiB increase in Slab/SUnreclaim, no host OOM, and the guest\nremains responsive.\n\nCompatibility with non-virtio transports:\n\n - VMCI uses the AF_VSOCK buffer knobs to size its queue pairs per\n socket based on the local vsk-\u003ebuffer_* values; the remote side\n cannot enlarge those queues beyond what the local endpoint\n configured.\n\n - Hyper-V\u0027s vsock transport uses fixed-size VMBus ring buffers and\n an MTU bound; there is no peer-controlled credit field comparable\n to peer_buf_alloc, and the remote endpoint cannot drive in-flight\n kernel memory above those ring sizes.\n\n - The loopback path reuses virtio_transport_common.c, so it\n naturally follows the same semantics as the virtio transport.\n\nThis change is limited to virtio_transport_common.c and thus affects\nvirtio-vsock, vhost-vsock, and loopback, bringing them in line with the\n\"remote window intersected with local policy\" behaviour that VMCI and\nHyper-V already effectively have.\n\n[Stefano: small adjustments after changing the previous patch]\n[Stefano: tweak the commit message]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23086",
"url": "https://www.suse.com/security/cve/CVE-2026-23086"
},
{
"category": "external",
"summary": "SUSE Bug 1257757 for CVE-2026-23086",
"url": "https://bugzilla.suse.com/1257757"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2026-23086"
},
{
"cve": "CVE-2026-23089",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23089"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: usb-audio: Fix use-after-free in snd_usb_mixer_free()\n\nWhen snd_usb_create_mixer() fails, snd_usb_mixer_free() frees\nmixer-\u003eid_elems but the controls already added to the card still\nreference the freed memory. Later when snd_card_register() runs,\nthe OSS mixer layer calls their callbacks and hits a use-after-free read.\n\nCall trace:\n get_ctl_value+0x63f/0x820 sound/usb/mixer.c:411\n get_min_max_with_quirks.isra.0+0x240/0x1f40 sound/usb/mixer.c:1241\n mixer_ctl_feature_info+0x26b/0x490 sound/usb/mixer.c:1381\n snd_mixer_oss_build_test+0x174/0x3a0 sound/core/oss/mixer_oss.c:887\n ...\n snd_card_register+0x4ed/0x6d0 sound/core/init.c:923\n usb_audio_probe+0x5ef/0x2a90 sound/usb/card.c:1025\n\nFix by calling snd_ctl_remove() for all mixer controls before freeing\nid_elems. We save the next pointer first because snd_ctl_remove()\nfrees the current element.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23089",
"url": "https://www.suse.com/security/cve/CVE-2026-23089"
},
{
"category": "external",
"summary": "SUSE Bug 1257790 for CVE-2026-23089",
"url": "https://bugzilla.suse.com/1257790"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2026-23089"
},
{
"cve": "CVE-2026-23090",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23090"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nslimbus: core: fix device reference leak on report present\n\nSlimbus devices can be allocated dynamically upon reception of\nreport-present messages.\n\nMake sure to drop the reference taken when looking up already registered\ndevices.\n\nNote that this requires taking an extra reference in case the device has\nnot yet been registered and has to be allocated.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23090",
"url": "https://www.suse.com/security/cve/CVE-2026-23090"
},
{
"category": "external",
"summary": "SUSE Bug 1257759 for CVE-2026-23090",
"url": "https://bugzilla.suse.com/1257759"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2026-23090"
},
{
"cve": "CVE-2026-23091",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23091"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nintel_th: fix device leak on output open()\n\nMake sure to drop the reference taken when looking up the th device\nduring output device open() on errors and on close().\n\nNote that a recent commit fixed the leak in a couple of open() error\npaths but not all of them, and the reference is still leaking on\nsuccessful open().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23091",
"url": "https://www.suse.com/security/cve/CVE-2026-23091"
},
{
"category": "external",
"summary": "SUSE Bug 1257813 for CVE-2026-23091",
"url": "https://bugzilla.suse.com/1257813"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2026-23091"
},
{
"cve": "CVE-2026-23094",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23094"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nuacce: fix isolate sysfs check condition\n\nuacce supports the device isolation feature. If the driver\nimplements the isolate_err_threshold_read and\nisolate_err_threshold_write callback functions, uacce will create\nsysfs files now. Users can read and configure the isolation policy\nthrough sysfs. Currently, sysfs files are created as long as either\nisolate_err_threshold_read or isolate_err_threshold_write callback\nfunctions are present.\n\nHowever, accessing a non-existent callback function may cause the\nsystem to crash. Therefore, intercept the creation of sysfs if\nneither read nor write exists; create sysfs if either is supported,\nbut intercept unsupported operations at the call site.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23094",
"url": "https://www.suse.com/security/cve/CVE-2026-23094"
},
{
"category": "external",
"summary": "SUSE Bug 1257811 for CVE-2026-23094",
"url": "https://bugzilla.suse.com/1257811"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2026-23094"
},
{
"cve": "CVE-2026-23095",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23095"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ngue: Fix skb memleak with inner IP protocol 0.\n\nsyzbot reported skb memleak below. [0]\n\nThe repro generated a GUE packet with its inner protocol 0.\n\ngue_udp_recv() returns -guehdr-\u003eproto_ctype for \"resubmit\"\nin ip_protocol_deliver_rcu(), but this only works with\nnon-zero protocol number.\n\nLet\u0027s drop such packets.\n\nNote that 0 is a valid number (IPv6 Hop-by-Hop Option).\n\nI think it is not practical to encap HOPOPT in GUE, so once\nsomeone starts to complain, we could pass down a resubmit\nflag pointer to distinguish two zeros from the upper layer:\n\n * no error\n * resubmit HOPOPT\n\n[0]\nBUG: memory leak\nunreferenced object 0xffff888109695a00 (size 240):\n comm \"syz.0.17\", pid 6088, jiffies 4294943096\n hex dump (first 32 bytes):\n 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n 00 40 c2 10 81 88 ff ff 00 00 00 00 00 00 00 00 .@..............\n backtrace (crc a84b336f):\n kmemleak_alloc_recursive include/linux/kmemleak.h:44 [inline]\n slab_post_alloc_hook mm/slub.c:4958 [inline]\n slab_alloc_node mm/slub.c:5263 [inline]\n kmem_cache_alloc_noprof+0x3b4/0x590 mm/slub.c:5270\n __build_skb+0x23/0x60 net/core/skbuff.c:474\n build_skb+0x20/0x190 net/core/skbuff.c:490\n __tun_build_skb drivers/net/tun.c:1541 [inline]\n tun_build_skb+0x4a1/0xa40 drivers/net/tun.c:1636\n tun_get_user+0xc12/0x2030 drivers/net/tun.c:1770\n tun_chr_write_iter+0x71/0x120 drivers/net/tun.c:1999\n new_sync_write fs/read_write.c:593 [inline]\n vfs_write+0x45d/0x710 fs/read_write.c:686\n ksys_write+0xa7/0x170 fs/read_write.c:738\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xa4/0xf80 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23095",
"url": "https://www.suse.com/security/cve/CVE-2026-23095"
},
{
"category": "external",
"summary": "SUSE Bug 1257808 for CVE-2026-23095",
"url": "https://bugzilla.suse.com/1257808"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2026-23095"
},
{
"cve": "CVE-2026-23096",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23096"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nuacce: fix cdev handling in the cleanup path\n\nWhen cdev_device_add fails, it internally releases the cdev memory,\nand if cdev_device_del is then executed, it will cause a hang error.\nTo fix it, we check the return value of cdev_device_add() and clear\nuacce-\u003ecdev to avoid calling cdev_device_del in the uacce_remove.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23096",
"url": "https://www.suse.com/security/cve/CVE-2026-23096"
},
{
"category": "external",
"summary": "SUSE Bug 1257809 for CVE-2026-23096",
"url": "https://bugzilla.suse.com/1257809"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2026-23096"
},
{
"cve": "CVE-2026-23099",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23099"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbonding: limit BOND_MODE_8023AD to Ethernet devices\n\nBOND_MODE_8023AD makes sense for ARPHRD_ETHER only.\n\nsyzbot reported:\n\n BUG: KASAN: global-out-of-bounds in __hw_addr_create net/core/dev_addr_lists.c:63 [inline]\n BUG: KASAN: global-out-of-bounds in __hw_addr_add_ex+0x25d/0x760 net/core/dev_addr_lists.c:118\nRead of size 16 at addr ffffffff8bf94040 by task syz.1.3580/19497\n\nCPU: 1 UID: 0 PID: 19497 Comm: syz.1.3580 Tainted: G L syzkaller #0 PREEMPT(full)\nTainted: [L]=SOFTLOCKUP\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025\nCall Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0xe8/0x150 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:378 [inline]\n print_report+0xca/0x240 mm/kasan/report.c:482\n kasan_report+0x118/0x150 mm/kasan/report.c:595\n check_region_inline mm/kasan/generic.c:-1 [inline]\n kasan_check_range+0x2b0/0x2c0 mm/kasan/generic.c:200\n __asan_memcpy+0x29/0x70 mm/kasan/shadow.c:105\n __hw_addr_create net/core/dev_addr_lists.c:63 [inline]\n __hw_addr_add_ex+0x25d/0x760 net/core/dev_addr_lists.c:118\n __dev_mc_add net/core/dev_addr_lists.c:868 [inline]\n dev_mc_add+0xa1/0x120 net/core/dev_addr_lists.c:886\n bond_enslave+0x2b8b/0x3ac0 drivers/net/bonding/bond_main.c:2180\n do_set_master+0x533/0x6d0 net/core/rtnetlink.c:2963\n do_setlink+0xcf0/0x41c0 net/core/rtnetlink.c:3165\n rtnl_changelink net/core/rtnetlink.c:3776 [inline]\n __rtnl_newlink net/core/rtnetlink.c:3935 [inline]\n rtnl_newlink+0x161c/0x1c90 net/core/rtnetlink.c:4072\n rtnetlink_rcv_msg+0x7cf/0xb70 net/core/rtnetlink.c:6958\n netlink_rcv_skb+0x208/0x470 net/netlink/af_netlink.c:2550\n netlink_unicast_kernel net/netlink/af_netlink.c:1318 [inline]\n netlink_unicast+0x82f/0x9e0 net/netlink/af_netlink.c:1344\n netlink_sendmsg+0x805/0xb30 net/netlink/af_netlink.c:1894\n sock_sendmsg_nosec net/socket.c:727 [inline]\n __sock_sendmsg+0x21c/0x270 net/socket.c:742\n ____sys_sendmsg+0x505/0x820 net/socket.c:2592\n ___sys_sendmsg+0x21f/0x2a0 net/socket.c:2646\n __sys_sendmsg+0x164/0x220 net/socket.c:2678\n do_syscall_32_irqs_on arch/x86/entry/syscall_32.c:83 [inline]\n __do_fast_syscall_32+0x1dc/0x560 arch/x86/entry/syscall_32.c:307\n do_fast_syscall_32+0x34/0x80 arch/x86/entry/syscall_32.c:332\n entry_SYSENTER_compat_after_hwframe+0x84/0x8e\n \u003c/TASK\u003e\n\nThe buggy address belongs to the variable:\n lacpdu_mcast_addr+0x0/0x40",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23099",
"url": "https://www.suse.com/security/cve/CVE-2026-23099"
},
{
"category": "external",
"summary": "SUSE Bug 1257816 for CVE-2026-23099",
"url": "https://bugzilla.suse.com/1257816"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2026-23099"
},
{
"cve": "CVE-2026-23101",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23101"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nleds: led-class: Only Add LED to leds_list when it is fully ready\n\nBefore this change the LED was added to leds_list before led_init_core()\ngets called adding it the list before led_classdev.set_brightness_work gets\ninitialized.\n\nThis leaves a window where led_trigger_register() of a LED\u0027s default\ntrigger will call led_trigger_set() which calls led_set_brightness()\nwhich in turn will end up queueing the *uninitialized*\nled_classdev.set_brightness_work.\n\nThis race gets hit by the lenovo-thinkpad-t14s EC driver which registers\n2 LEDs with a default trigger provided by snd_ctl_led.ko in quick\nsuccession. The first led_classdev_register() causes an async modprobe of\nsnd_ctl_led to run and that async modprobe manages to exactly hit\nthe window where the second LED is on the leds_list without led_init_core()\nbeing called for it, resulting in:\n\n ------------[ cut here ]------------\n WARNING: CPU: 11 PID: 5608 at kernel/workqueue.c:4234 __flush_work+0x344/0x390\n Hardware name: LENOVO 21N2S01F0B/21N2S01F0B, BIOS N42ET93W (2.23 ) 09/01/2025\n ...\n Call trace:\n __flush_work+0x344/0x390 (P)\n flush_work+0x2c/0x50\n led_trigger_set+0x1c8/0x340\n led_trigger_register+0x17c/0x1c0\n led_trigger_register_simple+0x84/0xe8\n snd_ctl_led_init+0x40/0xf88 [snd_ctl_led]\n do_one_initcall+0x5c/0x318\n do_init_module+0x9c/0x2b8\n load_module+0x7e0/0x998\n\nClose the race window by moving the adding of the LED to leds_list to\nafter the led_init_core() call.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23101",
"url": "https://www.suse.com/security/cve/CVE-2026-23101"
},
{
"category": "external",
"summary": "SUSE Bug 1257768 for CVE-2026-23101",
"url": "https://bugzilla.suse.com/1257768"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2026-23101"
},
{
"cve": "CVE-2026-23102",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23102"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\narm64/fpsimd: signal: Fix restoration of SVE context\n\nWhen SME is supported, Restoring SVE signal context can go wrong in a\nfew ways, including placing the task into an invalid state where the\nkernel may read from out-of-bounds memory (and may potentially take a\nfatal fault) and/or may kill the task with a SIGKILL.\n\n(1) Restoring a context with SVE_SIG_FLAG_SM set can place the task into\n an invalid state where SVCR.SM is set (and sve_state is non-NULL)\n but TIF_SME is clear, consequently resuting in out-of-bounds memory\n reads and/or killing the task with SIGKILL.\n\n This can only occur in unusual (but legitimate) cases where the SVE\n signal context has either been modified by userspace or was saved in\n the context of another task (e.g. as with CRIU), as otherwise the\n presence of an SVE signal context with SVE_SIG_FLAG_SM implies that\n TIF_SME is already set.\n\n While in this state, task_fpsimd_load() will NOT configure SMCR_ELx\n (leaving some arbitrary value configured in hardware) before\n restoring SVCR and attempting to restore the streaming mode SVE\n registers from memory via sve_load_state(). As the value of\n SMCR_ELx.LEN may be larger than the task\u0027s streaming SVE vector\n length, this may read memory outside of the task\u0027s allocated\n sve_state, reading unrelated data and/or triggering a fault.\n\n While this can result in secrets being loaded into streaming SVE\n registers, these values are never exposed. As TIF_SME is clear,\n fpsimd_bind_task_to_cpu() will configure CPACR_ELx.SMEN to trap EL0\n accesses to streaming mode SVE registers, so these cannot be\n accessed directly at EL0. As fpsimd_save_user_state() verifies the\n live vector length before saving (S)SVE state to memory, no secret\n values can be saved back to memory (and hence cannot be observed via\n ptrace, signals, etc).\n\n When the live vector length doesn\u0027t match the expected vector length\n for the task, fpsimd_save_user_state() will send a fatal SIGKILL\n signal to the task. Hence the task may be killed after executing\n userspace for some period of time.\n\n(2) Restoring a context with SVE_SIG_FLAG_SM clear does not clear the\n task\u0027s SVCR.SM. If SVCR.SM was set prior to restoring the context,\n then the task will be left in streaming mode unexpectedly, and some\n register state will be combined inconsistently, though the task will\n be left in legitimate state from the kernel\u0027s PoV.\n\n This can only occur in unusual (but legitimate) cases where ptrace\n has been used to set SVCR.SM after entry to the sigreturn syscall,\n as syscall entry clears SVCR.SM.\n\n In these cases, the the provided SVE register data will be loaded\n into the task\u0027s sve_state using the non-streaming SVE vector length\n and the FPSIMD registers will be merged into this using the\n streaming SVE vector length.\n\nFix (1) by setting TIF_SME when setting SVCR.SM. This also requires\nensuring that the task\u0027s sme_state has been allocated, but as this could\ncontain live ZA state, it should not be zeroed. Fix (2) by clearing\nSVCR.SM when restoring a SVE signal context with SVE_SIG_FLAG_SM clear.\n\nFor consistency, I\u0027ve pulled the manipulation of SVCR, TIF_SVE, TIF_SME,\nand fp_type earlier, immediately after the allocation of\nsve_state/sme_state, before the restore of the actual register state.\nThis makes it easier to ensure that these are always modified\nconsistently, even if a fault is taken while reading the register data\nfrom the signal context. I do not expect any software to depend on the\nexact state restored when a fault is taken while reading the context.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23102",
"url": "https://www.suse.com/security/cve/CVE-2026-23102"
},
{
"category": "external",
"summary": "SUSE Bug 1257772 for CVE-2026-23102",
"url": "https://bugzilla.suse.com/1257772"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2026-23102"
},
{
"cve": "CVE-2026-23104",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23104"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nice: fix devlink reload call trace\n\nCommit 4da71a77fc3b (\"ice: read internal temperature sensor\") introduced\ninternal temperature sensor reading via HWMON. ice_hwmon_init() was added\nto ice_init_feature() and ice_hwmon_exit() was added to ice_remove(). As a\nresult if devlink reload is used to reinit the device and then the driver\nis removed, a call trace can occur.\n\nBUG: unable to handle page fault for address: ffffffffc0fd4b5d\nCall Trace:\n string+0x48/0xe0\n vsnprintf+0x1f9/0x650\n sprintf+0x62/0x80\n name_show+0x1f/0x30\n dev_attr_show+0x19/0x60\n\nThe call trace repeats approximately every 10 minutes when system\nmonitoring tools (e.g., sadc) attempt to read the orphaned hwmon sysfs\nattributes that reference freed module memory.\n\nThe sequence is:\n1. Driver load, ice_hwmon_init() gets called from ice_init_feature()\n2. Devlink reload down, flow does not call ice_remove()\n3. Devlink reload up, ice_hwmon_init() gets called from\n ice_init_feature() resulting in a second instance\n4. Driver unload, ice_hwmon_exit() called from ice_remove() leaving the\n first hwmon instance orphaned with dangling pointer\n\nFix this by moving ice_hwmon_exit() from ice_remove() to\nice_deinit_features() to ensure proper cleanup symmetry with\nice_hwmon_init().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23104",
"url": "https://www.suse.com/security/cve/CVE-2026-23104"
},
{
"category": "external",
"summary": "SUSE Bug 1257763 for CVE-2026-23104",
"url": "https://bugzilla.suse.com/1257763"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2026-23104"
},
{
"cve": "CVE-2026-23105",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23105"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: qfq: Use cl_is_active to determine whether class is active in qfq_rm_from_ag\n\nThis is more of a preventive patch to make the code more consistent and\nto prevent possible exploits that employ child qlen manipulations on qfq.\nuse cl_is_active instead of relying on the child qdisc\u0027s qlen to determine\nclass activation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23105",
"url": "https://www.suse.com/security/cve/CVE-2026-23105"
},
{
"category": "external",
"summary": "SUSE Bug 1257775 for CVE-2026-23105",
"url": "https://bugzilla.suse.com/1257775"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2026-23105"
},
{
"cve": "CVE-2026-23107",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23107"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\narm64/fpsimd: signal: Allocate SSVE storage when restoring ZA\n\nThe code to restore a ZA context doesn\u0027t attempt to allocate the task\u0027s\nsve_state before setting TIF_SME. Consequently, restoring a ZA context\ncan place a task into an invalid state where TIF_SME is set but the\ntask\u0027s sve_state is NULL.\n\nIn legitimate but uncommon cases where the ZA signal context was NOT\ncreated by the kernel in the context of the same task (e.g. if the task\nis saved/restored with something like CRIU), we have no guarantee that\nsve_state had been allocated previously. In these cases, userspace can\nenter streaming mode without trapping while sve_state is NULL, causing a\nlater NULL pointer dereference when the kernel attempts to store the\nregister state:\n\n| # ./sigreturn-za\n| Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000\n| Mem abort info:\n| ESR = 0x0000000096000046\n| EC = 0x25: DABT (current EL), IL = 32 bits\n| SET = 0, FnV = 0\n| EA = 0, S1PTW = 0\n| FSC = 0x06: level 2 translation fault\n| Data abort info:\n| ISV = 0, ISS = 0x00000046, ISS2 = 0x00000000\n| CM = 0, WnR = 1, TnD = 0, TagAccess = 0\n| GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0\n| user pgtable: 4k pages, 52-bit VAs, pgdp=0000000101f47c00\n| [0000000000000000] pgd=08000001021d8403, p4d=0800000102274403, pud=0800000102275403, pmd=0000000000000000\n| Internal error: Oops: 0000000096000046 [#1] SMP\n| Modules linked in:\n| CPU: 0 UID: 0 PID: 153 Comm: sigreturn-za Not tainted 6.19.0-rc1 #1 PREEMPT\n| Hardware name: linux,dummy-virt (DT)\n| pstate: 214000c9 (nzCv daIF +PAN -UAO -TCO +DIT -SSBS BTYPE=--)\n| pc : sve_save_state+0x4/0xf0\n| lr : fpsimd_save_user_state+0xb0/0x1c0\n| sp : ffff80008070bcc0\n| x29: ffff80008070bcc0 x28: fff00000c1ca4c40 x27: 63cfa172fb5cf658\n| x26: fff00000c1ca5228 x25: 0000000000000000 x24: 0000000000000000\n| x23: 0000000000000000 x22: fff00000c1ca4c40 x21: fff00000c1ca4c40\n| x20: 0000000000000020 x19: fff00000ff6900f0 x18: 0000000000000000\n| x17: fff05e8e0311f000 x16: 0000000000000000 x15: 028fca8f3bdaf21c\n| x14: 0000000000000212 x13: fff00000c0209f10 x12: 0000000000000020\n| x11: 0000000000200b20 x10: 0000000000000000 x9 : fff00000ff69dcc0\n| x8 : 00000000000003f2 x7 : 0000000000000001 x6 : fff00000c1ca5b48\n| x5 : fff05e8e0311f000 x4 : 0000000008000000 x3 : 0000000000000000\n| x2 : 0000000000000001 x1 : fff00000c1ca5970 x0 : 0000000000000440\n| Call trace:\n| sve_save_state+0x4/0xf0 (P)\n| fpsimd_thread_switch+0x48/0x198\n| __switch_to+0x20/0x1c0\n| __schedule+0x36c/0xce0\n| schedule+0x34/0x11c\n| exit_to_user_mode_loop+0x124/0x188\n| el0_interrupt+0xc8/0xd8\n| __el0_irq_handler_common+0x18/0x24\n| el0t_64_irq_handler+0x10/0x1c\n| el0t_64_irq+0x198/0x19c\n| Code: 54000040 d51b4408 d65f03c0 d503245f (e5bb5800)\n| ---[ end trace 0000000000000000 ]---\n\nFix this by having restore_za_context() ensure that the task\u0027s sve_state\nis allocated, matching what we do when taking an SME trap. Any live\nSVE/SSVE state (which is restored earlier from a separate signal\ncontext) must be preserved, and hence this is not zeroed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23107",
"url": "https://www.suse.com/security/cve/CVE-2026-23107"
},
{
"category": "external",
"summary": "SUSE Bug 1257762 for CVE-2026-23107",
"url": "https://bugzilla.suse.com/1257762"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2026-23107"
},
{
"cve": "CVE-2026-23108",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23108"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: usb_8dev: usb_8dev_read_bulk_callback(): fix URB memory leak\n\nFix similar memory leak as in commit 7352e1d5932a (\"can: gs_usb:\ngs_usb_receive_bulk_callback(): fix URB memory leak\").\n\nIn usb_8dev_open() -\u003e usb_8dev_start(), the URBs for USB-in transfers are\nallocated, added to the priv-\u003erx_submitted anchor and submitted. In the\ncomplete callback usb_8dev_read_bulk_callback(), the URBs are processed and\nresubmitted. In usb_8dev_close() -\u003e unlink_all_urbs() the URBs are freed by\ncalling usb_kill_anchored_urbs(\u0026priv-\u003erx_submitted).\n\nHowever, this does not take into account that the USB framework unanchors\nthe URB before the complete function is called. This means that once an\nin-URB has been completed, it is no longer anchored and is ultimately not\nreleased in usb_kill_anchored_urbs().\n\nFix the memory leak by anchoring the URB in the\nusb_8dev_read_bulk_callback() to the priv-\u003erx_submitted anchor.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23108",
"url": "https://www.suse.com/security/cve/CVE-2026-23108"
},
{
"category": "external",
"summary": "SUSE Bug 1257770 for CVE-2026-23108",
"url": "https://bugzilla.suse.com/1257770"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2026-23108"
},
{
"cve": "CVE-2026-23110",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23110"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: core: Wake up the error handler when final completions race against each other\n\nThe fragile ordering between marking commands completed or failed so\nthat the error handler only wakes when the last running command\ncompletes or times out has race conditions. These race conditions can\ncause the SCSI layer to fail to wake the error handler, leaving I/O\nthrough the SCSI host stuck as the error state cannot advance.\n\nFirst, there is an memory ordering issue within scsi_dec_host_busy().\nThe write which clears SCMD_STATE_INFLIGHT may be reordered with reads\ncounting in scsi_host_busy(). While the local CPU will see its own\nwrite, reordering can allow other CPUs in scsi_dec_host_busy() or\nscsi_eh_inc_host_failed() to see a raised busy count, causing no CPU to\nsee a host busy equal to the host_failed count.\n\nThis race condition can be prevented with a memory barrier on the error\npath to force the write to be visible before counting host busy\ncommands.\n\nSecond, there is a general ordering issue with scsi_eh_inc_host_failed(). By\ncounting busy commands before incrementing host_failed, it can race with a\nfinal command in scsi_dec_host_busy(), such that scsi_dec_host_busy() does\nnot see host_failed incremented but scsi_eh_inc_host_failed() counts busy\ncommands before SCMD_STATE_INFLIGHT is cleared by scsi_dec_host_busy(),\nresulting in neither waking the error handler task.\n\nThis needs the call to scsi_host_busy() to be moved after host_failed is\nincremented to close the race condition.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23110",
"url": "https://www.suse.com/security/cve/CVE-2026-23110"
},
{
"category": "external",
"summary": "SUSE Bug 1257761 for CVE-2026-23110",
"url": "https://bugzilla.suse.com/1257761"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2026-23110"
},
{
"cve": "CVE-2026-23111",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23111"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: fix inverted genmask check in nft_map_catchall_activate()\n\nnft_map_catchall_activate() has an inverted element activity check\ncompared to its non-catchall counterpart nft_mapelem_activate() and\ncompared to what is logically required.\n\nnft_map_catchall_activate() is called from the abort path to re-activate\ncatchall map elements that were deactivated during a failed transaction.\nIt should skip elements that are already active (they don\u0027t need\nre-activation) and process elements that are inactive (they need to be\nrestored). Instead, the current code does the opposite: it skips inactive\nelements and processes active ones.\n\nCompare the non-catchall activate callback, which is correct:\n\n nft_mapelem_activate():\n if (nft_set_elem_active(ext, iter-\u003egenmask))\n return 0; /* skip active, process inactive */\n\nWith the buggy catchall version:\n\n nft_map_catchall_activate():\n if (!nft_set_elem_active(ext, genmask))\n continue; /* skip inactive, process active */\n\nThe consequence is that when a DELSET operation is aborted,\nnft_setelem_data_activate() is never called for the catchall element.\nFor NFT_GOTO verdict elements, this means nft_data_hold() is never\ncalled to restore the chain-\u003euse reference count. Each abort cycle\npermanently decrements chain-\u003euse. Once chain-\u003euse reaches zero,\nDELCHAIN succeeds and frees the chain while catchall verdict elements\nstill reference it, resulting in a use-after-free.\n\nThis is exploitable for local privilege escalation from an unprivileged\nuser via user namespaces + nftables on distributions that enable\nCONFIG_USER_NS and CONFIG_NF_TABLES.\n\nFix by removing the negation so the check matches nft_mapelem_activate():\nskip active elements, process inactive ones.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23111",
"url": "https://www.suse.com/security/cve/CVE-2026-23111"
},
{
"category": "external",
"summary": "SUSE Bug 1258181 for CVE-2026-23111",
"url": "https://bugzilla.suse.com/1258181"
},
{
"category": "external",
"summary": "SUSE Bug 1258183 for CVE-2026-23111",
"url": "https://bugzilla.suse.com/1258183"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "important"
}
],
"title": "CVE-2026-23111"
},
{
"cve": "CVE-2026-23112",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23112"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvmet-tcp: add bounds checks in nvmet_tcp_build_pdu_iovec\n\nnvmet_tcp_build_pdu_iovec() could walk past cmd-\u003ereq.sg when a PDU\nlength or offset exceeds sg_cnt and then use bogus sg-\u003elength/offset\nvalues, leading to _copy_to_iter() GPF/KASAN. Guard sg_idx, remaining\nentries, and sg-\u003elength/offset before building the bvec.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23112",
"url": "https://www.suse.com/security/cve/CVE-2026-23112"
},
{
"category": "external",
"summary": "SUSE Bug 1258184 for CVE-2026-23112",
"url": "https://bugzilla.suse.com/1258184"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2026-23112"
},
{
"cve": "CVE-2026-23113",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23113"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring/io-wq: check IO_WQ_BIT_EXIT inside work run loop\n\nCurrently this is checked before running the pending work. Normally this\nis quite fine, as work items either end up blocking (which will create a\nnew worker for other items), or they complete fairly quickly. But syzbot\nreports an issue where io-wq takes seemingly forever to exit, and with a\nbit of debugging, this turns out to be because it queues a bunch of big\n(2GB - 4096b) reads with a /dev/msr* file. Since this file type doesn\u0027t\nsupport -\u003eread_iter(), loop_rw_iter() ends up handling them. Each read\nreturns 16MB of data read, which takes 20 (!!) seconds. With a bunch of\nthese pending, processing the whole chain can take a long time. Easily\nlonger than the syzbot uninterruptible sleep timeout of 140 seconds.\nThis then triggers a complaint off the io-wq exit path:\n\nINFO: task syz.4.135:6326 blocked for more than 143 seconds.\n Not tainted syzkaller #0\n Blocked by coredump.\n\"echo 0 \u003e /proc/sys/kernel/hung_task_timeout_secs\" disables this message.\ntask:syz.4.135 state:D stack:26824 pid:6326 tgid:6324 ppid:5957 task_flags:0x400548 flags:0x00080000\nCall Trace:\n \u003cTASK\u003e\n context_switch kernel/sched/core.c:5256 [inline]\n __schedule+0x1139/0x6150 kernel/sched/core.c:6863\n __schedule_loop kernel/sched/core.c:6945 [inline]\n schedule+0xe7/0x3a0 kernel/sched/core.c:6960\n schedule_timeout+0x257/0x290 kernel/time/sleep_timeout.c:75\n do_wait_for_common kernel/sched/completion.c:100 [inline]\n __wait_for_common+0x2fc/0x4e0 kernel/sched/completion.c:121\n io_wq_exit_workers io_uring/io-wq.c:1328 [inline]\n io_wq_put_and_exit+0x271/0x8a0 io_uring/io-wq.c:1356\n io_uring_clean_tctx+0x10d/0x190 io_uring/tctx.c:203\n io_uring_cancel_generic+0x69c/0x9a0 io_uring/cancel.c:651\n io_uring_files_cancel include/linux/io_uring.h:19 [inline]\n do_exit+0x2ce/0x2bd0 kernel/exit.c:911\n do_group_exit+0xd3/0x2a0 kernel/exit.c:1112\n get_signal+0x2671/0x26d0 kernel/signal.c:3034\n arch_do_signal_or_restart+0x8f/0x7e0 arch/x86/kernel/signal.c:337\n __exit_to_user_mode_loop kernel/entry/common.c:41 [inline]\n exit_to_user_mode_loop+0x8c/0x540 kernel/entry/common.c:75\n __exit_to_user_mode_prepare include/linux/irq-entry-common.h:226 [inline]\n syscall_exit_to_user_mode_prepare include/linux/irq-entry-common.h:256 [inline]\n syscall_exit_to_user_mode_work include/linux/entry-common.h:159 [inline]\n syscall_exit_to_user_mode include/linux/entry-common.h:194 [inline]\n do_syscall_64+0x4ee/0xf80 arch/x86/entry/syscall_64.c:100\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7fa02738f749\nRSP: 002b:00007fa0281ae0e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca\nRAX: fffffffffffffe00 RBX: 00007fa0275e6098 RCX: 00007fa02738f749\nRDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007fa0275e6098\nRBP: 00007fa0275e6090 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000\nR13: 00007fa0275e6128 R14: 00007fff14e4fcb0 R15: 00007fff14e4fd98\n\nThere\u0027s really nothing wrong here, outside of processing these reads\nwill take a LONG time. However, we can speed up the exit by checking the\nIO_WQ_BIT_EXIT inside the io_worker_handle_work() loop, as syzbot will\nexit the ring after queueing up all of these reads. Then once the first\nitem is processed, io-wq will simply cancel the rest. That should avoid\nsyzbot running into this complaint again.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23113",
"url": "https://www.suse.com/security/cve/CVE-2026-23113"
},
{
"category": "external",
"summary": "SUSE Bug 1258278 for CVE-2026-23113",
"url": "https://bugzilla.suse.com/1258278"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2026-23113"
},
{
"cve": "CVE-2026-23116",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23116"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npmdomain: imx8m-blk-ctrl: Remove separate rst and clk mask for 8mq vpu\n\nFor i.MX8MQ platform, the ADB in the VPUMIX domain has no separate reset\nand clock enable bits, but is ungated and reset together with the VPUs.\nSo we can\u0027t reset G1 or G2 separately, it may led to the system hang.\nRemove rst_mask and clk_mask of imx8mq_vpu_blk_ctl_domain_data.\nLet imx8mq_vpu_power_notifier() do really vpu reset.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23116",
"url": "https://www.suse.com/security/cve/CVE-2026-23116"
},
{
"category": "external",
"summary": "SUSE Bug 1258277 for CVE-2026-23116",
"url": "https://bugzilla.suse.com/1258277"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2026-23116"
},
{
"cve": "CVE-2026-23119",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23119"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbonding: provide a net pointer to __skb_flow_dissect()\n\nAfter 3cbf4ffba5ee (\"net: plumb network namespace into __skb_flow_dissect\")\nwe have to provide a net pointer to __skb_flow_dissect(),\neither via skb-\u003edev, skb-\u003esk, or a user provided pointer.\n\nIn the following case, syzbot was able to cook a bare skb.\n\nWARNING: net/core/flow_dissector.c:1131 at __skb_flow_dissect+0xb57/0x68b0 net/core/flow_dissector.c:1131, CPU#1: syz.2.1418/11053\nCall Trace:\n \u003cTASK\u003e\n bond_flow_dissect drivers/net/bonding/bond_main.c:4093 [inline]\n __bond_xmit_hash+0x2d7/0xba0 drivers/net/bonding/bond_main.c:4157\n bond_xmit_hash_xdp drivers/net/bonding/bond_main.c:4208 [inline]\n bond_xdp_xmit_3ad_xor_slave_get drivers/net/bonding/bond_main.c:5139 [inline]\n bond_xdp_get_xmit_slave+0x1fd/0x710 drivers/net/bonding/bond_main.c:5515\n xdp_master_redirect+0x13f/0x2c0 net/core/filter.c:4388\n bpf_prog_run_xdp include/net/xdp.h:700 [inline]\n bpf_test_run+0x6b2/0x7d0 net/bpf/test_run.c:421\n bpf_prog_test_run_xdp+0x795/0x10e0 net/bpf/test_run.c:1390\n bpf_prog_test_run+0x2c7/0x340 kernel/bpf/syscall.c:4703\n __sys_bpf+0x562/0x860 kernel/bpf/syscall.c:6182\n __do_sys_bpf kernel/bpf/syscall.c:6274 [inline]\n __se_sys_bpf kernel/bpf/syscall.c:6272 [inline]\n __x64_sys_bpf+0x7c/0x90 kernel/bpf/syscall.c:6272\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xec/0xf80 arch/x86/entry/syscall_64.c:94",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23119",
"url": "https://www.suse.com/security/cve/CVE-2026-23119"
},
{
"category": "external",
"summary": "SUSE Bug 1258273 for CVE-2026-23119",
"url": "https://bugzilla.suse.com/1258273"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2026-23119"
},
{
"cve": "CVE-2026-23121",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23121"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmISDN: annotate data-race around dev-\u003ework\n\ndev-\u003ework can re read locklessly in mISDN_read()\nand mISDN_poll(). Add READ_ONCE()/WRITE_ONCE() annotations.\n\nBUG: KCSAN: data-race in mISDN_ioctl / mISDN_read\n\nwrite to 0xffff88812d848280 of 4 bytes by task 10864 on cpu 1:\n misdn_add_timer drivers/isdn/mISDN/timerdev.c:175 [inline]\n mISDN_ioctl+0x2fb/0x550 drivers/isdn/mISDN/timerdev.c:233\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:597 [inline]\n __se_sys_ioctl+0xce/0x140 fs/ioctl.c:583\n __x64_sys_ioctl+0x43/0x50 fs/ioctl.c:583\n x64_sys_call+0x14b0/0x3000 arch/x86/include/generated/asm/syscalls_64.h:17\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xd8/0x2c0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nread to 0xffff88812d848280 of 4 bytes by task 10857 on cpu 0:\n mISDN_read+0x1f2/0x470 drivers/isdn/mISDN/timerdev.c:112\n do_loop_readv_writev fs/read_write.c:847 [inline]\n vfs_readv+0x3fb/0x690 fs/read_write.c:1020\n do_readv+0xe7/0x210 fs/read_write.c:1080\n __do_sys_readv fs/read_write.c:1165 [inline]\n __se_sys_readv fs/read_write.c:1162 [inline]\n __x64_sys_readv+0x45/0x50 fs/read_write.c:1162\n x64_sys_call+0x2831/0x3000 arch/x86/include/generated/asm/syscalls_64.h:20\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xd8/0x2c0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nvalue changed: 0x00000000 -\u003e 0x00000001",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23121",
"url": "https://www.suse.com/security/cve/CVE-2026-23121"
},
{
"category": "external",
"summary": "SUSE Bug 1258309 for CVE-2026-23121",
"url": "https://bugzilla.suse.com/1258309"
},
{
"category": "external",
"summary": "SUSE Bug 1259135 for CVE-2026-23121",
"url": "https://bugzilla.suse.com/1259135"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "important"
}
],
"title": "CVE-2026-23121"
},
{
"cve": "CVE-2026-23129",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23129"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndpll: Prevent duplicate registrations\n\nModify the internal registration helpers dpll_xa_ref_{dpll,pin}_add()\nto reject duplicate registration attempts.\n\nPreviously, if a caller attempted to register the same pin multiple\ntimes (with the same ops, priv, and cookie) on the same device, the core\nsilently increments the reference count and return success. This behavior\nis incorrect because if the caller makes these duplicate registrations\nthen for the first one dpll_pin_registration is allocated and for others\nthe associated dpll_pin_ref.refcount is incremented. During the first\nunregistration the associated dpll_pin_registration is freed and for\nothers WARN is fired.\n\nFix this by updating the logic to return `-EEXIST` if a matching\nregistration is found to enforce a strict \"register once\" policy.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23129",
"url": "https://www.suse.com/security/cve/CVE-2026-23129"
},
{
"category": "external",
"summary": "SUSE Bug 1258299 for CVE-2026-23129",
"url": "https://bugzilla.suse.com/1258299"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2026-23129"
},
{
"cve": "CVE-2026-23133",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23133"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath10k: fix dma_free_coherent() pointer\n\ndma_alloc_coherent() allocates a DMA mapped buffer and stores the\naddresses in XXX_unaligned fields. Those should be reused when freeing\nthe buffer rather than the aligned addresses.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23133",
"url": "https://www.suse.com/security/cve/CVE-2026-23133"
},
{
"category": "external",
"summary": "SUSE Bug 1258249 for CVE-2026-23133",
"url": "https://bugzilla.suse.com/1258249"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2026-23133"
},
{
"cve": "CVE-2026-23135",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23135"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath12k: fix dma_free_coherent() pointer\n\ndma_alloc_coherent() allocates a DMA mapped buffer and stores the\naddresses in XXX_unaligned fields. Those should be reused when freeing\nthe buffer rather than the aligned addresses.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23135",
"url": "https://www.suse.com/security/cve/CVE-2026-23135"
},
{
"category": "external",
"summary": "SUSE Bug 1258245 for CVE-2026-23135",
"url": "https://bugzilla.suse.com/1258245"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2026-23135"
},
{
"cve": "CVE-2026-23139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23139"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_conncount: update last_gc only when GC has been performed\n\nCurrently last_gc is being updated everytime a new connection is\ntracked, that means that it is updated even if a GC wasn\u0027t performed.\nWith a sufficiently high packet rate, it is possible to always bypass\nthe GC, causing the list to grow infinitely.\n\nUpdate the last_gc value only when a GC has been actually performed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23139",
"url": "https://www.suse.com/security/cve/CVE-2026-23139"
},
{
"category": "external",
"summary": "SUSE Bug 1258304 for CVE-2026-23139",
"url": "https://bugzilla.suse.com/1258304"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2026-23139"
},
{
"cve": "CVE-2026-23141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23141"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: send: check for inline extents in range_is_hole_in_parent()\n\nBefore accessing the disk_bytenr field of a file extent item we need\nto check if we are dealing with an inline extent.\nThis is because for inline extents their data starts at the offset of\nthe disk_bytenr field. So accessing the disk_bytenr\nmeans we are accessing inline data or in case the inline data is less\nthan 8 bytes we can actually cause an invalid\nmemory access if this inline extent item is the first item in the leaf\nor access metadata from other items.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23141",
"url": "https://www.suse.com/security/cve/CVE-2026-23141"
},
{
"category": "external",
"summary": "SUSE Bug 1258377 for CVE-2026-23141",
"url": "https://bugzilla.suse.com/1258377"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2026-23141"
},
{
"cve": "CVE-2026-23145",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23145"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: fix iloc.bh leak in ext4_xattr_inode_update_ref\n\nThe error branch for ext4_xattr_inode_update_ref forget to release the\nrefcount for iloc.bh. Find this when review code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23145",
"url": "https://www.suse.com/security/cve/CVE-2026-23145"
},
{
"category": "external",
"summary": "SUSE Bug 1258326 for CVE-2026-23145",
"url": "https://bugzilla.suse.com/1258326"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2026-23145"
},
{
"cve": "CVE-2026-23146",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23146"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: hci_uart: fix null-ptr-deref in hci_uart_write_work\n\nhci_uart_set_proto() sets HCI_UART_PROTO_INIT before calling\nhci_uart_register_dev(), which calls proto-\u003eopen() to initialize\nhu-\u003epriv. However, if a TTY write wakeup occurs during this window,\nhci_uart_tx_wakeup() may schedule write_work before hu-\u003epriv is\ninitialized, leading to a NULL pointer dereference in\nhci_uart_write_work() when proto-\u003edequeue() accesses hu-\u003epriv.\n\nThe race condition is:\n\n CPU0 CPU1\n ---- ----\n hci_uart_set_proto()\n set_bit(HCI_UART_PROTO_INIT)\n hci_uart_register_dev()\n tty write wakeup\n hci_uart_tty_wakeup()\n hci_uart_tx_wakeup()\n schedule_work(\u0026hu-\u003ewrite_work)\n proto-\u003eopen(hu)\n // initializes hu-\u003epriv\n hci_uart_write_work()\n hci_uart_dequeue()\n proto-\u003edequeue(hu)\n // accesses hu-\u003epriv (NULL!)\n\nFix this by moving set_bit(HCI_UART_PROTO_INIT) after proto-\u003eopen()\nsucceeds, ensuring hu-\u003epriv is initialized before any work can be\nscheduled.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23146",
"url": "https://www.suse.com/security/cve/CVE-2026-23146"
},
{
"category": "external",
"summary": "SUSE Bug 1258234 for CVE-2026-23146",
"url": "https://bugzilla.suse.com/1258234"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2026-23146"
},
{
"cve": "CVE-2026-23150",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23150"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfc: llcp: Fix memleak in nfc_llcp_send_ui_frame().\n\nsyzbot reported various memory leaks related to NFC, struct\nnfc_llcp_sock, sk_buff, nfc_dev, etc. [0]\n\nThe leading log hinted that nfc_llcp_send_ui_frame() failed\nto allocate skb due to sock_error(sk) being -ENXIO.\n\nENXIO is set by nfc_llcp_socket_release() when struct\nnfc_llcp_local is destroyed by local_cleanup().\n\nThe problem is that there is no synchronisation between\nnfc_llcp_send_ui_frame() and local_cleanup(), and skb\ncould be put into local-\u003etx_queue after it was purged in\nlocal_cleanup():\n\n CPU1 CPU2\n ---- ----\n nfc_llcp_send_ui_frame() local_cleanup()\n |- do { \u0027\n |- pdu = nfc_alloc_send_skb(..., \u0026err)\n | .\n | |- nfc_llcp_socket_release(local, false, ENXIO);\n | |- skb_queue_purge(\u0026local-\u003etx_queue); |\n | \u0027 |\n |- skb_queue_tail(\u0026local-\u003etx_queue, pdu); |\n ... |\n |- pdu = nfc_alloc_send_skb(..., \u0026err) |\n ^._________________________________.\u0027\n\nlocal_cleanup() is called for struct nfc_llcp_local only\nafter nfc_llcp_remove_local() unlinks it from llcp_devices.\n\nIf we hold local-\u003etx_queue.lock then, we can synchronise\nthe thread and nfc_llcp_send_ui_frame().\n\nLet\u0027s do that and check list_empty(\u0026local-\u003elist) before\nqueuing skb to local-\u003etx_queue in nfc_llcp_send_ui_frame().\n\n[0]:\n[ 56.074943][ T6096] llcp: nfc_llcp_send_ui_frame: Could not allocate PDU (error=-6)\n[ 64.318868][ T5813] kmemleak: 6 new suspected memory leaks (see /sys/kernel/debug/kmemleak)\nBUG: memory leak\nunreferenced object 0xffff8881272f6800 (size 1024):\n comm \"syz.0.17\", pid 6096, jiffies 4294942766\n hex dump (first 32 bytes):\n 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n 27 00 03 40 00 00 00 00 00 00 00 00 00 00 00 00 \u0027..@............\n backtrace (crc da58d84d):\n kmemleak_alloc_recursive include/linux/kmemleak.h:44 [inline]\n slab_post_alloc_hook mm/slub.c:4979 [inline]\n slab_alloc_node mm/slub.c:5284 [inline]\n __do_kmalloc_node mm/slub.c:5645 [inline]\n __kmalloc_noprof+0x3e3/0x6b0 mm/slub.c:5658\n kmalloc_noprof include/linux/slab.h:961 [inline]\n sk_prot_alloc+0x11a/0x1b0 net/core/sock.c:2239\n sk_alloc+0x36/0x360 net/core/sock.c:2295\n nfc_llcp_sock_alloc+0x37/0x130 net/nfc/llcp_sock.c:979\n llcp_sock_create+0x71/0xd0 net/nfc/llcp_sock.c:1044\n nfc_sock_create+0xc9/0xf0 net/nfc/af_nfc.c:31\n __sock_create+0x1a9/0x340 net/socket.c:1605\n sock_create net/socket.c:1663 [inline]\n __sys_socket_create net/socket.c:1700 [inline]\n __sys_socket+0xb9/0x1a0 net/socket.c:1747\n __do_sys_socket net/socket.c:1761 [inline]\n __se_sys_socket net/socket.c:1759 [inline]\n __x64_sys_socket+0x1b/0x30 net/socket.c:1759\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xa4/0xfa0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nBUG: memory leak\nunreferenced object 0xffff88810fbd9800 (size 240):\n comm \"syz.0.17\", pid 6096, jiffies 4294942850\n hex dump (first 32 bytes):\n 68 f0 ff 08 81 88 ff ff 68 f0 ff 08 81 88 ff ff h.......h.......\n 00 00 00 00 00 00 00 00 00 68 2f 27 81 88 ff ff .........h/\u0027....\n backtrace (crc 6cc652b1):\n kmemleak_alloc_recursive include/linux/kmemleak.h:44 [inline]\n slab_post_alloc_hook mm/slub.c:4979 [inline]\n slab_alloc_node mm/slub.c:5284 [inline]\n kmem_cache_alloc_node_noprof+0x36f/0x5e0 mm/slub.c:5336\n __alloc_skb+0x203/0x240 net/core/skbuff.c:660\n alloc_skb include/linux/skbuff.h:1383 [inline]\n alloc_skb_with_frags+0x69/0x3f0 net/core/sk\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23150",
"url": "https://www.suse.com/security/cve/CVE-2026-23150"
},
{
"category": "external",
"summary": "SUSE Bug 1258354 for CVE-2026-23150",
"url": "https://bugzilla.suse.com/1258354"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2026-23150"
},
{
"cve": "CVE-2026-23151",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23151"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: MGMT: Fix memory leak in set_ssp_complete\n\nFix memory leak in set_ssp_complete() where mgmt_pending_cmd structures\nare not freed after being removed from the pending list.\n\nCommit 302a1f674c00 (\"Bluetooth: MGMT: Fix possible UAFs\") replaced\nmgmt_pending_foreach() calls with individual command handling but missed\nadding mgmt_pending_free() calls in both error and success paths of\nset_ssp_complete(). Other completion functions like set_le_complete()\nwere fixed correctly in the same commit.\n\nThis causes a memory leak of the mgmt_pending_cmd structure and its\nassociated parameter data for each SSP command that completes.\n\nAdd the missing mgmt_pending_free(cmd) calls in both code paths to fix\nthe memory leak. Also fix the same issue in set_advertising_complete().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23151",
"url": "https://www.suse.com/security/cve/CVE-2026-23151"
},
{
"category": "external",
"summary": "SUSE Bug 1258237 for CVE-2026-23151",
"url": "https://bugzilla.suse.com/1258237"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2026-23151"
},
{
"cve": "CVE-2026-23152",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23152"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mac80211: correctly decode TTLM with default link map\n\nTID-To-Link Mapping (TTLM) elements do not contain any link mapping\npresence indicator if a default mapping is used and parsing needs to be\nskipped.\n\nNote that access points should not explicitly report an advertised TTLM\nwith a default mapping as that is the implied mapping if the element is\nnot included, this is even the case when switching back to the default\nmapping. However, mac80211 would incorrectly parse the frame and would\nalso read one byte beyond the end of the element.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23152",
"url": "https://www.suse.com/security/cve/CVE-2026-23152"
},
{
"category": "external",
"summary": "SUSE Bug 1258252 for CVE-2026-23152",
"url": "https://bugzilla.suse.com/1258252"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2026-23152"
},
{
"cve": "CVE-2026-23155",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23155"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: gs_usb: gs_usb_receive_bulk_callback(): fix error message\n\nSinc commit 79a6d1bfe114 (\"can: gs_usb: gs_usb_receive_bulk_callback():\nunanchor URL on usb_submit_urb() error\") a failing resubmit URB will print\nan info message.\n\nIn the case of a short read where netdev has not yet been assigned,\ninitialize as NULL to avoid dereferencing an undefined value. Also report\nthe error value of the failed resubmit.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23155",
"url": "https://www.suse.com/security/cve/CVE-2026-23155"
},
{
"category": "external",
"summary": "SUSE Bug 1258313 for CVE-2026-23155",
"url": "https://bugzilla.suse.com/1258313"
},
{
"category": "external",
"summary": "SUSE Bug 1258315 for CVE-2026-23155",
"url": "https://bugzilla.suse.com/1258315"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "important"
}
],
"title": "CVE-2026-23155"
},
{
"cve": "CVE-2026-23156",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23156"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nefivarfs: fix error propagation in efivar_entry_get()\n\nefivar_entry_get() always returns success even if the underlying\n__efivar_entry_get() fails, masking errors.\n\nThis may result in uninitialized heap memory being copied to userspace\nin the efivarfs_file_read() path.\n\nFix it by returning the error from __efivar_entry_get().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23156",
"url": "https://www.suse.com/security/cve/CVE-2026-23156"
},
{
"category": "external",
"summary": "SUSE Bug 1258317 for CVE-2026-23156",
"url": "https://bugzilla.suse.com/1258317"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2026-23156"
},
{
"cve": "CVE-2026-23163",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23163"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: fix NULL pointer dereference in amdgpu_gmc_filter_faults_remove\n\nOn APUs such as Raven and Renoir (GC 9.1.0, 9.2.2, 9.3.0), the ih1 and\nih2 interrupt ring buffers are not initialized. This is by design, as\nthese secondary IH rings are only available on discrete GPUs. See\nvega10_ih_sw_init() which explicitly skips ih1/ih2 initialization when\nAMD_IS_APU is set.\n\nHowever, amdgpu_gmc_filter_faults_remove() unconditionally uses ih1 to\nget the timestamp of the last interrupt entry. When retry faults are\nenabled on APUs (noretry=0), this function is called from the SVM page\nfault recovery path, resulting in a NULL pointer dereference when\namdgpu_ih_decode_iv_ts_helper() attempts to access ih-\u003ering[].\n\nThe crash manifests as:\n\n BUG: kernel NULL pointer dereference, address: 0000000000000004\n RIP: 0010:amdgpu_ih_decode_iv_ts_helper+0x22/0x40 [amdgpu]\n Call Trace:\n amdgpu_gmc_filter_faults_remove+0x60/0x130 [amdgpu]\n svm_range_restore_pages+0xae5/0x11c0 [amdgpu]\n amdgpu_vm_handle_fault+0xc8/0x340 [amdgpu]\n gmc_v9_0_process_interrupt+0x191/0x220 [amdgpu]\n amdgpu_irq_dispatch+0xed/0x2c0 [amdgpu]\n amdgpu_ih_process+0x84/0x100 [amdgpu]\n\nThis issue was exposed by commit 1446226d32a4 (\"drm/amdgpu: Remove GC HW\nIP 9.3.0 from noretry=1\") which changed the default for Renoir APU from\nnoretry=1 to noretry=0, enabling retry fault handling and thus\nexercising the buggy code path.\n\nFix this by adding a check for ih1.ring_size before attempting to use\nit. Also restore the soft_ih support from commit dd299441654f (\"drm/amdgpu:\nRework retry fault removal\"). This is needed if the hardware doesn\u0027t\nsupport secondary HW IH rings.\n\nv2: additional updates (Alex)\n\n(cherry picked from commit 6ce8d536c80aa1f059e82184f0d1994436b1d526)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23163",
"url": "https://www.suse.com/security/cve/CVE-2026-23163"
},
{
"category": "external",
"summary": "SUSE Bug 1258544 for CVE-2026-23163",
"url": "https://bugzilla.suse.com/1258544"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2026-23163"
},
{
"cve": "CVE-2026-23166",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23166"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nice: Fix NULL pointer dereference in ice_vsi_set_napi_queues\n\nAdd NULL pointer checks in ice_vsi_set_napi_queues() to prevent crashes\nduring resume from suspend when rings[q_idx]-\u003eq_vector is NULL.\n\nTested adaptor:\n60:00.0 Ethernet controller [0200]: Intel Corporation Ethernet Controller E810-XXV for SFP [8086:159b] (rev 02)\n Subsystem: Intel Corporation Ethernet Network Adapter E810-XXV-2 [8086:4003]\n\nSR-IOV state: both disabled and enabled can reproduce this issue.\n\nkernel version: v6.18\n\nReproduce steps:\nBoot up and execute suspend like systemctl suspend or rtcwake.\n\nLog:\n\u003c1\u003e[ 231.443607] BUG: kernel NULL pointer dereference, address: 0000000000000040\n\u003c1\u003e[ 231.444052] #PF: supervisor read access in kernel mode\n\u003c1\u003e[ 231.444484] #PF: error_code(0x0000) - not-present page\n\u003c6\u003e[ 231.444913] PGD 0 P4D 0\n\u003c4\u003e[ 231.445342] Oops: Oops: 0000 [#1] SMP NOPTI\n\u003c4\u003e[ 231.446635] RIP: 0010:netif_queue_set_napi+0xa/0x170\n\u003c4\u003e[ 231.447067] Code: 31 f6 31 ff c3 cc cc cc cc 0f 1f 80 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1f 44 00 00 48 85 c9 74 0b \u003c48\u003e 83 79 30 00 0f 84 39 01 00 00 55 41 89 d1 49 89 f8 89 f2 48 89\n\u003c4\u003e[ 231.447513] RSP: 0018:ffffcc780fc078c0 EFLAGS: 00010202\n\u003c4\u003e[ 231.447961] RAX: ffff8b848ca30400 RBX: ffff8b848caf2028 RCX: 0000000000000010\n\u003c4\u003e[ 231.448443] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff8b848dbd4000\n\u003c4\u003e[ 231.448896] RBP: ffffcc780fc078e8 R08: 0000000000000000 R09: 0000000000000000\n\u003c4\u003e[ 231.449345] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000001\n\u003c4\u003e[ 231.449817] R13: ffff8b848dbd4000 R14: ffff8b84833390c8 R15: 0000000000000000\n\u003c4\u003e[ 231.450265] FS: 00007c7b29e9d740(0000) GS:ffff8b8c068e2000(0000) knlGS:0000000000000000\n\u003c4\u003e[ 231.450715] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n\u003c4\u003e[ 231.451179] CR2: 0000000000000040 CR3: 000000030626f004 CR4: 0000000000f72ef0\n\u003c4\u003e[ 231.451629] PKRU: 55555554\n\u003c4\u003e[ 231.452076] Call Trace:\n\u003c4\u003e[ 231.452549] \u003cTASK\u003e\n\u003c4\u003e[ 231.452996] ? ice_vsi_set_napi_queues+0x4d/0x110 [ice]\n\u003c4\u003e[ 231.453482] ice_resume+0xfd/0x220 [ice]\n\u003c4\u003e[ 231.453977] ? __pfx_pci_pm_resume+0x10/0x10\n\u003c4\u003e[ 231.454425] pci_pm_resume+0x8c/0x140\n\u003c4\u003e[ 231.454872] ? __pfx_pci_pm_resume+0x10/0x10\n\u003c4\u003e[ 231.455347] dpm_run_callback+0x5f/0x160\n\u003c4\u003e[ 231.455796] ? dpm_wait_for_superior+0x107/0x170\n\u003c4\u003e[ 231.456244] device_resume+0x177/0x270\n\u003c4\u003e[ 231.456708] dpm_resume+0x209/0x2f0\n\u003c4\u003e[ 231.457151] dpm_resume_end+0x15/0x30\n\u003c4\u003e[ 231.457596] suspend_devices_and_enter+0x1da/0x2b0\n\u003c4\u003e[ 231.458054] enter_state+0x10e/0x570\n\nAdd defensive checks for both the ring pointer and its q_vector\nbefore dereferencing, allowing the system to resume successfully even when\nq_vectors are unmapped.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23166",
"url": "https://www.suse.com/security/cve/CVE-2026-23166"
},
{
"category": "external",
"summary": "SUSE Bug 1258272 for CVE-2026-23166",
"url": "https://bugzilla.suse.com/1258272"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2026-23166"
},
{
"cve": "CVE-2026-23167",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23167"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfc: nci: Fix race between rfkill and nci_unregister_device().\n\nsyzbot reported the splat below [0] without a repro.\n\nIt indicates that struct nci_dev.cmd_wq had been destroyed before\nnci_close_device() was called via rfkill.\n\nnci_dev.cmd_wq is only destroyed in nci_unregister_device(), which\n(I think) was called from virtual_ncidev_close() when syzbot close()d\nan fd of virtual_ncidev.\n\nThe problem is that nci_unregister_device() destroys nci_dev.cmd_wq\nfirst and then calls nfc_unregister_device(), which removes the\ndevice from rfkill by rfkill_unregister().\n\nSo, the device is still visible via rfkill even after nci_dev.cmd_wq\nis destroyed.\n\nLet\u0027s unregister the device from rfkill first in nci_unregister_device().\n\nNote that we cannot call nfc_unregister_device() before\nnci_close_device() because\n\n 1) nfc_unregister_device() calls device_del() which frees\n all memory allocated by devm_kzalloc() and linked to\n ndev-\u003econn_info_list\n\n 2) nci_rx_work() could try to queue nci_conn_info to\n ndev-\u003econn_info_list which could be leaked\n\nThus, nfc_unregister_device() is split into two functions so we\ncan remove rfkill interfaces only before nci_close_device().\n\n[0]:\nDEBUG_LOCKS_WARN_ON(1)\nWARNING: kernel/locking/lockdep.c:238 at hlock_class kernel/locking/lockdep.c:238 [inline], CPU#0: syz.0.8675/6349\nWARNING: kernel/locking/lockdep.c:238 at check_wait_context kernel/locking/lockdep.c:4854 [inline], CPU#0: syz.0.8675/6349\nWARNING: kernel/locking/lockdep.c:238 at __lock_acquire+0x39d/0x2cf0 kernel/locking/lockdep.c:5187, CPU#0: syz.0.8675/6349\nModules linked in:\nCPU: 0 UID: 0 PID: 6349 Comm: syz.0.8675 Not tainted syzkaller #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026\nRIP: 0010:hlock_class kernel/locking/lockdep.c:238 [inline]\nRIP: 0010:check_wait_context kernel/locking/lockdep.c:4854 [inline]\nRIP: 0010:__lock_acquire+0x3a4/0x2cf0 kernel/locking/lockdep.c:5187\nCode: 18 00 4c 8b 74 24 08 75 27 90 e8 17 f2 fc 02 85 c0 74 1c 83 3d 50 e0 4e 0e 00 75 13 48 8d 3d 43 f7 51 0e 48 c7 c6 8b 3a de 8d \u003c67\u003e 48 0f b9 3a 90 31 c0 0f b6 98 c4 00 00 00 41 8b 45 20 25 ff 1f\nRSP: 0018:ffffc9000c767680 EFLAGS: 00010046\nRAX: 0000000000000001 RBX: 0000000000040000 RCX: 0000000000080000\nRDX: ffffc90013080000 RSI: ffffffff8dde3a8b RDI: ffffffff8ff24ca0\nRBP: 0000000000000003 R08: ffffffff8fef35a3 R09: 1ffffffff1fde6b4\nR10: dffffc0000000000 R11: fffffbfff1fde6b5 R12: 00000000000012a2\nR13: ffff888030338ba8 R14: ffff888030338000 R15: ffff888030338b30\nFS: 00007fa5995f66c0(0000) GS:ffff8881256f8000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007f7e72f842d0 CR3: 00000000485a0000 CR4: 00000000003526f0\nCall Trace:\n \u003cTASK\u003e\n lock_acquire+0x106/0x330 kernel/locking/lockdep.c:5868\n touch_wq_lockdep_map+0xcb/0x180 kernel/workqueue.c:3940\n __flush_workqueue+0x14b/0x14f0 kernel/workqueue.c:3982\n nci_close_device+0x302/0x630 net/nfc/nci/core.c:567\n nci_dev_down+0x3b/0x50 net/nfc/nci/core.c:639\n nfc_dev_down+0x152/0x290 net/nfc/core.c:161\n nfc_rfkill_set_block+0x2d/0x100 net/nfc/core.c:179\n rfkill_set_block+0x1d2/0x440 net/rfkill/core.c:346\n rfkill_fop_write+0x461/0x5a0 net/rfkill/core.c:1301\n vfs_write+0x29a/0xb90 fs/read_write.c:684\n ksys_write+0x150/0x270 fs/read_write.c:738\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xe2/0xf80 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7fa59b39acb9\nCode: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007fa5995f6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001\nRAX: ffffffffffffffda RBX: 00007fa59b615fa0 RCX: 00007fa59b39acb9\nRDX: 0000000000000008 RSI: 0000200000000080 RDI: 0000000000000007\nRBP: 00007fa59b408bf7 R08: \n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23167",
"url": "https://www.suse.com/security/cve/CVE-2026-23167"
},
{
"category": "external",
"summary": "SUSE Bug 1258374 for CVE-2026-23167",
"url": "https://bugzilla.suse.com/1258374"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2026-23167"
},
{
"cve": "CVE-2026-23170",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23170"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/imx/tve: fix probe device leak\n\nMake sure to drop the reference taken to the DDC device during probe on\nprobe failure (e.g. probe deferral) and on driver unbind.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23170",
"url": "https://www.suse.com/security/cve/CVE-2026-23170"
},
{
"category": "external",
"summary": "SUSE Bug 1258379 for CVE-2026-23170",
"url": "https://bugzilla.suse.com/1258379"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2026-23170"
},
{
"cve": "CVE-2026-23171",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23171"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbonding: fix use-after-free due to enslave fail after slave array update\n\nFix a use-after-free which happens due to enslave failure after the new\nslave has been added to the array. Since the new slave can be used for Tx\nimmediately, we can use it after it has been freed by the enslave error\ncleanup path which frees the allocated slave memory. Slave update array is\nsupposed to be called last when further enslave failures are not expected.\nMove it after xdp setup to avoid any problems.\n\nIt is very easy to reproduce the problem with a simple xdp_pass prog:\n ip l add bond1 type bond mode balance-xor\n ip l set bond1 up\n ip l set dev bond1 xdp object xdp_pass.o sec xdp_pass\n ip l add dumdum type dummy\n\nThen run in parallel:\n while :; do ip l set dumdum master bond1 1\u003e/dev/null 2\u003e\u00261; done;\n mausezahn bond1 -a own -b rand -A rand -B 1.1.1.1 -c 0 -t tcp \"dp=1-1023, flags=syn\"\n\nThe crash happens almost immediately:\n [ 605.602850] Oops: general protection fault, probably for non-canonical address 0xe0e6fc2460000137: 0000 [#1] SMP KASAN NOPTI\n [ 605.602916] KASAN: maybe wild-memory-access in range [0x07380123000009b8-0x07380123000009bf]\n [ 605.602946] CPU: 0 UID: 0 PID: 2445 Comm: mausezahn Kdump: loaded Tainted: G B 6.19.0-rc6+ #21 PREEMPT(voluntary)\n [ 605.602979] Tainted: [B]=BAD_PAGE\n [ 605.602998] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014\n [ 605.603032] RIP: 0010:netdev_core_pick_tx+0xcd/0x210\n [ 605.603063] Code: 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 3e 01 00 00 48 b8 00 00 00 00 00 fc ff df 4c 8b 6b 08 49 8d 7d 30 48 89 fa 48 c1 ea 03 \u003c80\u003e 3c 02 00 0f 85 25 01 00 00 49 8b 45 30 4c 89 e2 48 89 ee 48 89\n [ 605.603111] RSP: 0018:ffff88817b9af348 EFLAGS: 00010213\n [ 605.603145] RAX: dffffc0000000000 RBX: ffff88817d28b420 RCX: 0000000000000000\n [ 605.603172] RDX: 00e7002460000137 RSI: 0000000000000008 RDI: 07380123000009be\n [ 605.603199] RBP: ffff88817b541a00 R08: 0000000000000001 R09: fffffbfff3ed8c0c\n [ 605.603226] R10: ffffffff9f6c6067 R11: 0000000000000001 R12: 0000000000000000\n [ 605.603253] R13: 073801230000098e R14: ffff88817d28b448 R15: ffff88817b541a84\n [ 605.603286] FS: 00007f6570ef67c0(0000) GS:ffff888221dfa000(0000) knlGS:0000000000000000\n [ 605.603319] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n [ 605.603343] CR2: 00007f65712fae40 CR3: 000000011371b000 CR4: 0000000000350ef0\n [ 605.603373] Call Trace:\n [ 605.603392] \u003cTASK\u003e\n [ 605.603410] __dev_queue_xmit+0x448/0x32a0\n [ 605.603434] ? __pfx_vprintk_emit+0x10/0x10\n [ 605.603461] ? __pfx_vprintk_emit+0x10/0x10\n [ 605.603484] ? __pfx___dev_queue_xmit+0x10/0x10\n [ 605.603507] ? bond_start_xmit+0xbfb/0xc20 [bonding]\n [ 605.603546] ? _printk+0xcb/0x100\n [ 605.603566] ? __pfx__printk+0x10/0x10\n [ 605.603589] ? bond_start_xmit+0xbfb/0xc20 [bonding]\n [ 605.603627] ? add_taint+0x5e/0x70\n [ 605.603648] ? add_taint+0x2a/0x70\n [ 605.603670] ? end_report.cold+0x51/0x75\n [ 605.603693] ? bond_start_xmit+0xbfb/0xc20 [bonding]\n [ 605.603731] bond_start_xmit+0x623/0xc20 [bonding]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23171",
"url": "https://www.suse.com/security/cve/CVE-2026-23171"
},
{
"category": "external",
"summary": "SUSE Bug 1258349 for CVE-2026-23171",
"url": "https://bugzilla.suse.com/1258349"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2026-23171"
},
{
"cve": "CVE-2026-23172",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23172"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: wwan: t7xx: fix potential skb-\u003efrags overflow in RX path\n\nWhen receiving data in the DPMAIF RX path,\nthe t7xx_dpmaif_set_frag_to_skb() function adds\npage fragments to an skb without checking if the number of\nfragments has exceeded MAX_SKB_FRAGS. This could lead to a buffer overflow\nin skb_shinfo(skb)-\u003efrags[] array, corrupting adjacent memory and\npotentially causing kernel crashes or other undefined behavior.\n\nThis issue was identified through static code analysis by comparing with a\nsimilar vulnerability fixed in the mt76 driver commit b102f0c522cf (\"mt76:\nfix array overflow on receiving too many fragments for a packet\").\n\nThe vulnerability could be triggered if the modem firmware sends packets\nwith excessive fragments. While under normal protocol conditions (MTU 3080\nbytes, BAT buffer 3584 bytes),\na single packet should not require additional\nfragments, the kernel should not blindly trust firmware behavior.\nMalicious, buggy, or compromised firmware could potentially craft packets\nwith more fragments than the kernel expects.\n\nFix this by adding a bounds check before calling skb_add_rx_frag() to\nensure nr_frags does not exceed MAX_SKB_FRAGS.\n\nThe check must be performed before unmapping to avoid a page leak\nand double DMA unmap during device teardown.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23172",
"url": "https://www.suse.com/security/cve/CVE-2026-23172"
},
{
"category": "external",
"summary": "SUSE Bug 1258519 for CVE-2026-23172",
"url": "https://bugzilla.suse.com/1258519"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2026-23172"
},
{
"cve": "CVE-2026-23173",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23173"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5e: TC, delete flows only for existing peers\n\nWhen deleting TC steering flows, iterate only over actual devcom\npeers instead of assuming all possible ports exist. This avoids\ntouching non-existent peers and ensures cleanup is limited to\ndevices the driver is currently connected to.\n\n BUG: kernel NULL pointer dereference, address: 0000000000000008\n #PF: supervisor write access in kernel mode\n #PF: error_code(0x0002) - not-present page\n PGD 133c8a067 P4D 0\n Oops: Oops: 0002 [#1] SMP\n CPU: 19 UID: 0 PID: 2169 Comm: tc Not tainted 6.18.0+ #156 NONE\n Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014\n RIP: 0010:mlx5e_tc_del_fdb_peers_flow+0xbe/0x200 [mlx5_core]\n Code: 00 00 a8 08 74 a8 49 8b 46 18 f6 c4 02 74 9f 4c 8d bf a0 12 00 00 4c 89 ff e8 0e e7 96 e1 49 8b 44 24 08 49 8b 0c 24 4c 89 ff \u003c48\u003e 89 41 08 48 89 08 49 89 2c 24 49 89 5c 24 08 e8 7d ce 96 e1 49\n RSP: 0018:ff11000143867528 EFLAGS: 00010246\n RAX: 0000000000000000 RBX: dead000000000122 RCX: 0000000000000000\n RDX: ff11000143691580 RSI: ff110001026e5000 RDI: ff11000106f3d2a0\n RBP: dead000000000100 R08: 00000000000003fd R09: 0000000000000002\n R10: ff11000101c75690 R11: ff1100085faea178 R12: ff11000115f0ae78\n R13: 0000000000000000 R14: ff11000115f0a800 R15: ff11000106f3d2a0\n FS: 00007f35236bf740(0000) GS:ff110008dc809000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 0000000000000008 CR3: 0000000157a01001 CR4: 0000000000373eb0\n Call Trace:\n \u003cTASK\u003e\n mlx5e_tc_del_flow+0x46/0x270 [mlx5_core]\n mlx5e_flow_put+0x25/0x50 [mlx5_core]\n mlx5e_delete_flower+0x2a6/0x3e0 [mlx5_core]\n tc_setup_cb_reoffload+0x20/0x80\n fl_reoffload+0x26f/0x2f0 [cls_flower]\n ? mlx5e_tc_reoffload_flows_work+0xc0/0xc0 [mlx5_core]\n ? mlx5e_tc_reoffload_flows_work+0xc0/0xc0 [mlx5_core]\n tcf_block_playback_offloads+0x9e/0x1c0\n tcf_block_unbind+0x7b/0xd0\n tcf_block_setup+0x186/0x1d0\n tcf_block_offload_cmd.isra.0+0xef/0x130\n tcf_block_offload_unbind+0x43/0x70\n __tcf_block_put+0x85/0x160\n ingress_destroy+0x32/0x110 [sch_ingress]\n __qdisc_destroy+0x44/0x100\n qdisc_graft+0x22b/0x610\n tc_get_qdisc+0x183/0x4d0\n rtnetlink_rcv_msg+0x2d7/0x3d0\n ? rtnl_calcit.isra.0+0x100/0x100\n netlink_rcv_skb+0x53/0x100\n netlink_unicast+0x249/0x320\n ? __alloc_skb+0x102/0x1f0\n netlink_sendmsg+0x1e3/0x420\n __sock_sendmsg+0x38/0x60\n ____sys_sendmsg+0x1ef/0x230\n ? copy_msghdr_from_user+0x6c/0xa0\n ___sys_sendmsg+0x7f/0xc0\n ? ___sys_recvmsg+0x8a/0xc0\n ? __sys_sendto+0x119/0x180\n __sys_sendmsg+0x61/0xb0\n do_syscall_64+0x55/0x640\n entry_SYSCALL_64_after_hwframe+0x4b/0x53\n RIP: 0033:0x7f35238bb764\n Code: 15 b9 86 0c 00 f7 d8 64 89 02 b8 ff ff ff ff eb bf 0f 1f 44 00 00 f3 0f 1e fa 80 3d e5 08 0d 00 00 74 13 b8 2e 00 00 00 0f 05 \u003c48\u003e 3d 00 f0 ff ff 77 4c c3 0f 1f 00 55 48 89 e5 48 83 ec 20 89 55\n RSP: 002b:00007ffed4c35638 EFLAGS: 00000202 ORIG_RAX: 000000000000002e\n RAX: ffffffffffffffda RBX: 000055a2efcc75e0 RCX: 00007f35238bb764\n RDX: 0000000000000000 RSI: 00007ffed4c356a0 RDI: 0000000000000003\n RBP: 00007ffed4c35710 R08: 0000000000000010 R09: 00007f3523984b20\n R10: 0000000000000004 R11: 0000000000000202 R12: 00007ffed4c35790\n R13: 000000006947df8f R14: 000055a2efcc75e0 R15: 00007ffed4c35780",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23173",
"url": "https://www.suse.com/security/cve/CVE-2026-23173"
},
{
"category": "external",
"summary": "SUSE Bug 1258520 for CVE-2026-23173",
"url": "https://bugzilla.suse.com/1258520"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2026-23173"
},
{
"cve": "CVE-2026-23176",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23176"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nplatform/x86: toshiba_haps: Fix memory leaks in add/remove routines\n\ntoshiba_haps_add() leaks the haps object allocated by it if it returns\nan error after allocating that object successfully.\n\ntoshiba_haps_remove() does not free the object pointed to by\ntoshiba_haps before clearing that pointer, so it becomes unreachable\nallocated memory.\n\nAddress these memory leaks by using devm_kzalloc() for allocating\nthe memory in question.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23176",
"url": "https://www.suse.com/security/cve/CVE-2026-23176"
},
{
"category": "external",
"summary": "SUSE Bug 1258256 for CVE-2026-23176",
"url": "https://bugzilla.suse.com/1258256"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2026-23176"
},
{
"cve": "CVE-2026-23178",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23178"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: i2c-hid: fix potential buffer overflow in i2c_hid_get_report()\n\n`i2c_hid_xfer` is used to read `recv_len + sizeof(__le16)` bytes of data\ninto `ihid-\u003erawbuf`.\n\nThe former can come from the userspace in the hidraw driver and is only\nbounded by HID_MAX_BUFFER_SIZE(16384) by default (unless we also set\n`max_buffer_size` field of `struct hid_ll_driver` which we do not).\n\nThe latter has size determined at runtime by the maximum size of\ndifferent report types you could receive on any particular device and\ncan be a much smaller value.\n\nFix this by truncating `recv_len` to `ihid-\u003ebufsize - sizeof(__le16)`.\n\nThe impact is low since access to hidraw devices requires root.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23178",
"url": "https://www.suse.com/security/cve/CVE-2026-23178"
},
{
"category": "external",
"summary": "SUSE Bug 1258358 for CVE-2026-23178",
"url": "https://bugzilla.suse.com/1258358"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2026-23178"
},
{
"cve": "CVE-2026-23179",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23179"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvmet-tcp: fixup hang in nvmet_tcp_listen_data_ready()\n\nWhen the socket is closed while in TCP_LISTEN a callback is run to\nflush all outstanding packets, which in turns calls\nnvmet_tcp_listen_data_ready() with the sk_callback_lock held.\nSo we need to check if we are in TCP_LISTEN before attempting\nto get the sk_callback_lock() to avoid a deadlock.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23179",
"url": "https://www.suse.com/security/cve/CVE-2026-23179"
},
{
"category": "external",
"summary": "SUSE Bug 1258394 for CVE-2026-23179",
"url": "https://bugzilla.suse.com/1258394"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2026-23179"
},
{
"cve": "CVE-2026-23182",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23182"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nspi: tegra: Fix a memory leak in tegra_slink_probe()\n\nIn tegra_slink_probe(), when platform_get_irq() fails, it directly\nreturns from the function with an error code, which causes a memory leak.\n\nReplace it with a goto label to ensure proper cleanup.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23182",
"url": "https://www.suse.com/security/cve/CVE-2026-23182"
},
{
"category": "external",
"summary": "SUSE Bug 1258259 for CVE-2026-23182",
"url": "https://bugzilla.suse.com/1258259"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2026-23182"
},
{
"cve": "CVE-2026-23190",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23190"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: amd: fix memory leak in acp3x pdm dma ops",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23190",
"url": "https://www.suse.com/security/cve/CVE-2026-23190"
},
{
"category": "external",
"summary": "SUSE Bug 1258397 for CVE-2026-23190",
"url": "https://bugzilla.suse.com/1258397"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2026-23190"
},
{
"cve": "CVE-2026-23191",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23191"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: aloop: Fix racy access at PCM trigger\n\nThe PCM trigger callback of aloop driver tries to check the PCM state\nand stop the stream of the tied substream in the corresponding cable.\nSince both check and stop operations are performed outside the cable\nlock, this may result in UAF when a program attempts to trigger\nfrequently while opening/closing the tied stream, as spotted by\nfuzzers.\n\nFor addressing the UAF, this patch changes two things:\n- It covers the most of code in loopback_check_format() with\n cable-\u003elock spinlock, and add the proper NULL checks. This avoids\n already some racy accesses.\n- In addition, now we try to check the state of the capture PCM stream\n that may be stopped in this function, which was the major pain point\n leading to UAF.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23191",
"url": "https://www.suse.com/security/cve/CVE-2026-23191"
},
{
"category": "external",
"summary": "SUSE Bug 1258395 for CVE-2026-23191",
"url": "https://bugzilla.suse.com/1258395"
},
{
"category": "external",
"summary": "SUSE Bug 1258396 for CVE-2026-23191",
"url": "https://bugzilla.suse.com/1258396"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "important"
}
],
"title": "CVE-2026-23191"
},
{
"cve": "CVE-2026-23198",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23198"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: Don\u0027t clobber irqfd routing type when deassigning irqfd\n\nWhen deassigning a KVM_IRQFD, don\u0027t clobber the irqfd\u0027s copy of the IRQ\u0027s\nrouting entry as doing so breaks kvm_arch_irq_bypass_del_producer() on x86\nand arm64, which explicitly look for KVM_IRQ_ROUTING_MSI. Instead, to\nhandle a concurrent routing update, verify that the irqfd is still active\nbefore consuming the routing information. As evidenced by the x86 and\narm64 bugs, and another bug in kvm_arch_update_irqfd_routing() (see below),\nclobbering the entry type without notifying arch code is surprising and\nerror prone.\n\nAs a bonus, checking that the irqfd is active provides a convenient\nlocation for documenting _why_ KVM must not consume the routing entry for\nan irqfd that is in the process of being deassigned: once the irqfd is\ndeleted from the list (which happens *before* the eventfd is detached), it\nwill no longer receive updates via kvm_irq_routing_update(), and so KVM\ncould deliver an event using stale routing information (relative to\nKVM_SET_GSI_ROUTING returning to userspace).\n\nAs an even better bonus, explicitly checking for the irqfd being active\nfixes a similar bug to the one the clobbering is trying to prevent: if an\nirqfd is deactivated, and then its routing is changed,\nkvm_irq_routing_update() won\u0027t invoke kvm_arch_update_irqfd_routing()\n(because the irqfd isn\u0027t in the list). And so if the irqfd is in bypass\nmode, IRQs will continue to be posted using the old routing information.\n\nAs for kvm_arch_irq_bypass_del_producer(), clobbering the routing type\nresults in KVM incorrectly keeping the IRQ in bypass mode, which is\nespecially problematic on AMD as KVM tracks IRQs that are being posted to\na vCPU in a list whose lifetime is tied to the irqfd.\n\nWithout the help of KASAN to detect use-after-free, the most common\nsympton on AMD is a NULL pointer deref in amd_iommu_update_ga() due to\nthe memory for irqfd structure being re-allocated and zeroed, resulting\nin irqfd-\u003eirq_bypass_data being NULL when read by\navic_update_iommu_vcpu_affinity():\n\n BUG: kernel NULL pointer dereference, address: 0000000000000018\n #PF: supervisor read access in kernel mode\n #PF: error_code(0x0000) - not-present page\n PGD 40cf2b9067 P4D 40cf2b9067 PUD 408362a067 PMD 0\n Oops: Oops: 0000 [#1] SMP\n CPU: 6 UID: 0 PID: 40383 Comm: vfio_irq_test\n Tainted: G U W O 6.19.0-smp--5dddc257e6b2-irqfd #31 NONE\n Tainted: [U]=USER, [W]=WARN, [O]=OOT_MODULE\n Hardware name: Google, Inc. Arcadia_IT_80/Arcadia_IT_80, BIOS 34.78.2-0 09/05/2025\n RIP: 0010:amd_iommu_update_ga+0x19/0xe0\n Call Trace:\n \u003cTASK\u003e\n avic_update_iommu_vcpu_affinity+0x3d/0x90 [kvm_amd]\n __avic_vcpu_load+0xf4/0x130 [kvm_amd]\n kvm_arch_vcpu_load+0x89/0x210 [kvm]\n vcpu_load+0x30/0x40 [kvm]\n kvm_arch_vcpu_ioctl_run+0x45/0x620 [kvm]\n kvm_vcpu_ioctl+0x571/0x6a0 [kvm]\n __se_sys_ioctl+0x6d/0xb0\n do_syscall_64+0x6f/0x9d0\n entry_SYSCALL_64_after_hwframe+0x4b/0x53\n RIP: 0033:0x46893b\n \u003c/TASK\u003e\n ---[ end trace 0000000000000000 ]---\n\nIf AVIC is inhibited when the irfd is deassigned, the bug will manifest as\nlist corruption, e.g. on the next irqfd assignment.\n\n list_add corruption. next-\u003eprev should be prev (ffff8d474d5cd588),\n but was 0000000000000000. (next=ffff8d8658f86530).\n ------------[ cut here ]------------\n kernel BUG at lib/list_debug.c:31!\n Oops: invalid opcode: 0000 [#1] SMP\n CPU: 128 UID: 0 PID: 80818 Comm: vfio_irq_test\n Tainted: G U W O 6.19.0-smp--f19dc4d680ba-irqfd #28 NONE\n Tainted: [U]=USER, [W]=WARN, [O]=OOT_MODULE\n Hardware name: Google, Inc. Arcadia_IT_80/Arcadia_IT_80, BIOS 34.78.2-0 09/05/2025\n RIP: 0010:__list_add_valid_or_report+0x97/0xc0\n Call Trace:\n \u003cTASK\u003e\n avic_pi_update_irte+0x28e/0x2b0 [kvm_amd]\n kvm_pi_update_irte+0xbf/0x190 [kvm]\n kvm_arch_irq_bypass_add_producer+0x72/0x90 [kvm]\n irq_bypass_register_consumer+0xcd/0x170 [irqbypa\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23198",
"url": "https://www.suse.com/security/cve/CVE-2026-23198"
},
{
"category": "external",
"summary": "SUSE Bug 1258321 for CVE-2026-23198",
"url": "https://bugzilla.suse.com/1258321"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2026-23198"
},
{
"cve": "CVE-2026-23202",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23202"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nspi: tegra210-quad: Protect curr_xfer in tegra_qspi_combined_seq_xfer\n\nThe curr_xfer field is read by the IRQ handler without holding the lock\nto check if a transfer is in progress. When clearing curr_xfer in the\ncombined sequence transfer loop, protect it with the spinlock to prevent\na race with the interrupt handler.\n\nProtect the curr_xfer clearing at the exit path of\ntegra_qspi_combined_seq_xfer() with the spinlock to prevent a race\nwith the interrupt handler that reads this field.\n\nWithout this protection, the IRQ handler could read a partially updated\ncurr_xfer value, leading to NULL pointer dereference or use-after-free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23202",
"url": "https://www.suse.com/security/cve/CVE-2026-23202"
},
{
"category": "external",
"summary": "SUSE Bug 1258338 for CVE-2026-23202",
"url": "https://bugzilla.suse.com/1258338"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "important"
}
],
"title": "CVE-2026-23202"
},
{
"cve": "CVE-2026-23207",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23207"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nspi: tegra210-quad: Protect curr_xfer check in IRQ handler\n\nNow that all other accesses to curr_xfer are done under the lock,\nprotect the curr_xfer NULL check in tegra_qspi_isr_thread() with the\nspinlock. Without this protection, the following race can occur:\n\n CPU0 (ISR thread) CPU1 (timeout path)\n ---------------- -------------------\n if (!tqspi-\u003ecurr_xfer)\n // sees non-NULL\n spin_lock()\n tqspi-\u003ecurr_xfer = NULL\n spin_unlock()\n handle_*_xfer()\n spin_lock()\n t = tqspi-\u003ecurr_xfer // NULL!\n ... t-\u003elen ... // NULL dereference!\n\nWith this patch, all curr_xfer accesses are now properly synchronized.\n\nAlthough all accesses to curr_xfer are done under the lock, in\ntegra_qspi_isr_thread() it checks for NULL, releases the lock and\nreacquires it later in handle_cpu_based_xfer()/handle_dma_based_xfer().\nThere is a potential for an update in between, which could cause a NULL\npointer dereference.\n\nTo handle this, add a NULL check inside the handlers after acquiring\nthe lock. This ensures that if the timeout path has already cleared\ncurr_xfer, the handler will safely return without dereferencing the\nNULL pointer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23207",
"url": "https://www.suse.com/security/cve/CVE-2026-23207"
},
{
"category": "external",
"summary": "SUSE Bug 1258524 for CVE-2026-23207",
"url": "https://bugzilla.suse.com/1258524"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2026-23207"
},
{
"cve": "CVE-2026-23208",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23208"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: usb-audio: Prevent excessive number of frames\n\nIn this case, the user constructed the parameters with maxpacksize 40\nfor rate 22050 / pps 1000, and packsize[0] 22 packsize[1] 23. The buffer\nsize for each data URB is maxpacksize * packets, which in this example\nis 40 * 6 = 240; When the user performs a write operation to send audio\ndata into the ALSA PCM playback stream, the calculated number of frames\nis packsize[0] * packets = 264, which exceeds the allocated URB buffer\nsize, triggering the out-of-bounds (OOB) issue reported by syzbot [1].\n\nAdded a check for the number of single data URB frames when calculating\nthe number of frames to prevent [1].\n\n[1]\nBUG: KASAN: slab-out-of-bounds in copy_to_urb+0x261/0x460 sound/usb/pcm.c:1487\nWrite of size 264 at addr ffff88804337e800 by task syz.0.17/5506\nCall Trace:\n copy_to_urb+0x261/0x460 sound/usb/pcm.c:1487\n prepare_playback_urb+0x953/0x13d0 sound/usb/pcm.c:1611\n prepare_outbound_urb+0x377/0xc50 sound/usb/endpoint.c:333",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23208",
"url": "https://www.suse.com/security/cve/CVE-2026-23208"
},
{
"category": "external",
"summary": "SUSE Bug 1258468 for CVE-2026-23208",
"url": "https://bugzilla.suse.com/1258468"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2026-23208"
},
{
"cve": "CVE-2026-23209",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23209"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmacvlan: fix error recovery in macvlan_common_newlink()\n\nvalis provided a nice repro to crash the kernel:\n\nip link add p1 type veth peer p2\nip link set address 00:00:00:00:00:20 dev p1\nip link set up dev p1\nip link set up dev p2\n\nip link add mv0 link p2 type macvlan mode source\nip link add invalid% link p2 type macvlan mode source macaddr add 00:00:00:00:00:20\n\nping -c1 -I p1 1.2.3.4\n\nHe also gave a very detailed analysis:\n\n\u003cquote valis\u003e\n\nThe issue is triggered when a new macvlan link is created with\nMACVLAN_MODE_SOURCE mode and MACVLAN_MACADDR_ADD (or\nMACVLAN_MACADDR_SET) parameter, lower device already has a macvlan\nport and register_netdevice() called from macvlan_common_newlink()\nfails (e.g. because of the invalid link name).\n\nIn this case macvlan_hash_add_source is called from\nmacvlan_change_sources() / macvlan_common_newlink():\n\nThis adds a reference to vlan to the port\u0027s vlan_source_hash using\nmacvlan_source_entry.\n\nvlan is a pointer to the priv data of the link that is being created.\n\nWhen register_netdevice() fails, the error is returned from\nmacvlan_newlink() to rtnl_newlink_create():\n\n if (ops-\u003enewlink)\n err = ops-\u003enewlink(dev, \u0026params, extack);\n else\n err = register_netdevice(dev);\n if (err \u003c 0) {\n free_netdev(dev);\n goto out;\n }\n\nand free_netdev() is called, causing a kvfree() on the struct\nnet_device that is still referenced in the source entry attached to\nthe lower device\u0027s macvlan port.\n\nNow all packets sent on the macvlan port with a matching source mac\naddress will trigger a use-after-free in macvlan_forward_source().\n\n\u003c/quote valis\u003e\n\nWith all that, my fix is to make sure we call macvlan_flush_sources()\nregardless of @create value whenever \"goto destroy_macvlan_port;\"\npath is taken.\n\nMany thanks to valis for following up on this issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23209",
"url": "https://www.suse.com/security/cve/CVE-2026-23209"
},
{
"category": "external",
"summary": "SUSE Bug 1258518 for CVE-2026-23209",
"url": "https://bugzilla.suse.com/1258518"
},
{
"category": "external",
"summary": "SUSE Bug 1258784 for CVE-2026-23209",
"url": "https://bugzilla.suse.com/1258784"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "important"
}
],
"title": "CVE-2026-23209"
},
{
"cve": "CVE-2026-23213",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23213"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/pm: Disable MMIO access during SMU Mode 1 reset\n\nDuring Mode 1 reset, the ASIC undergoes a reset cycle and becomes\ntemporarily inaccessible via PCIe. Any attempt to access MMIO registers\nduring this window (e.g., from interrupt handlers or other driver threads)\ncan result in uncompleted PCIe transactions, leading to NMI panics or\nsystem hangs.\n\nTo prevent this, set the `no_hw_access` flag to true immediately after\ntriggering the reset. This signals other driver components to skip\nregister accesses while the device is offline.\n\nA memory barrier `smp_mb()` is added to ensure the flag update is\nglobally visible to all cores before the driver enters the sleep/wait\nstate.\n\n(cherry picked from commit 7edb503fe4b6d67f47d8bb0dfafb8e699bb0f8a4)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23213",
"url": "https://www.suse.com/security/cve/CVE-2026-23213"
},
{
"category": "external",
"summary": "SUSE Bug 1258465 for CVE-2026-23213",
"url": "https://bugzilla.suse.com/1258465"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2026-23213"
},
{
"cve": "CVE-2026-23214",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23214"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: reject new transactions if the fs is fully read-only\n\n[BUG]\nThere is a bug report where a heavily fuzzed fs is mounted with all\nrescue mount options, which leads to the following warnings during\nunmount:\n\n BTRFS: Transaction aborted (error -22)\n Modules linked in:\n CPU: 0 UID: 0 PID: 9758 Comm: repro.out Not tainted\n 6.19.0-rc5-00002-gb71e635feefc #7 PREEMPT(full)\n Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014\n RIP: 0010:find_free_extent_update_loop fs/btrfs/extent-tree.c:4208 [inline]\n RIP: 0010:find_free_extent+0x52f0/0x5d20 fs/btrfs/extent-tree.c:4611\n Call Trace:\n \u003cTASK\u003e\n btrfs_reserve_extent+0x2cd/0x790 fs/btrfs/extent-tree.c:4705\n btrfs_alloc_tree_block+0x1e1/0x10e0 fs/btrfs/extent-tree.c:5157\n btrfs_force_cow_block+0x578/0x2410 fs/btrfs/ctree.c:517\n btrfs_cow_block+0x3c4/0xa80 fs/btrfs/ctree.c:708\n btrfs_search_slot+0xcad/0x2b50 fs/btrfs/ctree.c:2130\n btrfs_truncate_inode_items+0x45d/0x2350 fs/btrfs/inode-item.c:499\n btrfs_evict_inode+0x923/0xe70 fs/btrfs/inode.c:5628\n evict+0x5f4/0xae0 fs/inode.c:837\n __dentry_kill+0x209/0x660 fs/dcache.c:670\n finish_dput+0xc9/0x480 fs/dcache.c:879\n shrink_dcache_for_umount+0xa0/0x170 fs/dcache.c:1661\n generic_shutdown_super+0x67/0x2c0 fs/super.c:621\n kill_anon_super+0x3b/0x70 fs/super.c:1289\n btrfs_kill_super+0x41/0x50 fs/btrfs/super.c:2127\n deactivate_locked_super+0xbc/0x130 fs/super.c:474\n cleanup_mnt+0x425/0x4c0 fs/namespace.c:1318\n task_work_run+0x1d4/0x260 kernel/task_work.c:233\n exit_task_work include/linux/task_work.h:40 [inline]\n do_exit+0x694/0x22f0 kernel/exit.c:971\n do_group_exit+0x21c/0x2d0 kernel/exit.c:1112\n __do_sys_exit_group kernel/exit.c:1123 [inline]\n __se_sys_exit_group kernel/exit.c:1121 [inline]\n __x64_sys_exit_group+0x3f/0x40 kernel/exit.c:1121\n x64_sys_call+0x2210/0x2210 arch/x86/include/generated/asm/syscalls_64.h:232\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xe8/0xf80 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n RIP: 0033:0x44f639\n Code: Unable to access opcode bytes at 0x44f60f.\n RSP: 002b:00007ffc15c4e088 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7\n RAX: ffffffffffffffda RBX: 00000000004c32f0 RCX: 000000000044f639\n RDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000001\n RBP: 0000000000000001 R08: ffffffffffffffc0 R09: 0000000000000000\n R10: 0000000000000000 R11: 0000000000000246 R12: 00000000004c32f0\n R13: 0000000000000001 R14: 0000000000000000 R15: 0000000000000001\n \u003c/TASK\u003e\n\nSince rescue mount options will mark the full fs read-only, there should\nbe no new transaction triggered.\n\nBut during unmount we will evict all inodes, which can trigger a new\ntransaction, and triggers warnings on a heavily corrupted fs.\n\n[CAUSE]\nBtrfs allows new transaction even on a read-only fs, this is to allow\nlog replay happen even on read-only mounts, just like what ext4/xfs do.\n\nHowever with rescue mount options, the fs is fully read-only and cannot\nbe remounted read-write, thus in that case we should also reject any new\ntransactions.\n\n[FIX]\nIf we find the fs has rescue mount options, we should treat the fs as\nerror, so that no new transaction can be started.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23214",
"url": "https://www.suse.com/security/cve/CVE-2026-23214"
},
{
"category": "external",
"summary": "SUSE Bug 1258464 for CVE-2026-23214",
"url": "https://bugzilla.suse.com/1258464"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2026-23214"
},
{
"cve": "CVE-2026-23221",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23221"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbus: fsl-mc: fix use-after-free in driver_override_show()\n\nThe driver_override_show() function reads the driver_override string\nwithout holding the device_lock. However, driver_override_store() uses\ndriver_set_override(), which modifies and frees the string while holding\nthe device_lock.\n\nThis can result in a concurrent use-after-free if the string is freed\nby the store function while being read by the show function.\n\nFix this by holding the device_lock around the read operation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23221",
"url": "https://www.suse.com/security/cve/CVE-2026-23221"
},
{
"category": "external",
"summary": "SUSE Bug 1258660 for CVE-2026-23221",
"url": "https://bugzilla.suse.com/1258660"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2026-23221"
},
{
"cve": "CVE-2026-23222",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23222"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: omap - Allocate OMAP_CRYPTO_FORCE_COPY scatterlists correctly\n\nThe existing allocation of scatterlists in omap_crypto_copy_sg_lists()\nwas allocating an array of scatterlist pointers, not scatterlist objects,\nresulting in a 4x too small allocation.\n\nUse sizeof(*new_sg) to get the correct object size.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23222",
"url": "https://www.suse.com/security/cve/CVE-2026-23222"
},
{
"category": "external",
"summary": "SUSE Bug 1258484 for CVE-2026-23222",
"url": "https://bugzilla.suse.com/1258484"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2026-23222"
},
{
"cve": "CVE-2026-23229",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23229"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: virtio - Add spinlock protection with virtqueue notification\n\nWhen VM boots with one virtio-crypto PCI device and builtin backend,\nrun openssl benchmark command with multiple processes, such as\n openssl speed -evp aes-128-cbc -engine afalg -seconds 10 -multi 32\n\nopenssl processes will hangup and there is error reported like this:\n virtio_crypto virtio0: dataq.0:id 3 is not a head!\n\nIt seems that the data virtqueue need protection when it is handled\nfor virtio done notification. If the spinlock protection is added\nin virtcrypto_done_task(), openssl benchmark with multiple processes\nworks well.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23229",
"url": "https://www.suse.com/security/cve/CVE-2026-23229"
},
{
"category": "external",
"summary": "SUSE Bug 1258429 for CVE-2026-23229",
"url": "https://bugzilla.suse.com/1258429"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-40.1.21.17.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-40.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-40.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-40.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T16:03:14Z",
"details": "moderate"
}
],
"title": "CVE-2026-23229"
}
]
}
FKIE_CVE-2025-40103
Vulnerability from fkie_nvd - Published: 2025-10-30 10:15 - Updated: 2025-10-30 15:03| URL | Tags | ||
|---|---|---|---|
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/790282abe9d805f08618c1c24ea2529e7259b692 | ||
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/896bb31e1416f582503db1350cf1bd10dc64e5a6 | ||
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/c2b77f42205ef485a647f62082c442c1cd69d3fc | ||
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/d7dd034c14928306db1b46be277ae439b84dacf9 | ||
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/e15605b68b490186da2ad8029c0351a9cfb0b9af |
| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: Fix refcount leak for cifs_sb_tlink\n\nFix three refcount inconsistency issues related to `cifs_sb_tlink`.\n\nComments for `cifs_sb_tlink` state that `cifs_put_tlink()` needs to be\ncalled after successful calls to `cifs_sb_tlink()`. Three calls fail to\nupdate refcount accordingly, leading to possible resource leaks."
}
],
"id": "CVE-2025-40103",
"lastModified": "2025-10-30T15:03:13.440",
"metrics": {},
"published": "2025-10-30T10:15:34.693",
"references": [
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/790282abe9d805f08618c1c24ea2529e7259b692"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/896bb31e1416f582503db1350cf1bd10dc64e5a6"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/c2b77f42205ef485a647f62082c442c1cd69d3fc"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/d7dd034c14928306db1b46be277ae439b84dacf9"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/e15605b68b490186da2ad8029c0351a9cfb0b9af"
}
],
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"vulnStatus": "Awaiting Analysis"
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.