Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-38061 (GCVE-0-2025-38061)
Vulnerability from cvelistv5
Published
2025-06-18 09:33
Modified
2025-06-18 09:33
Severity ?
VLAI Severity ?
EPSS score ?
Summary
In the Linux kernel, the following vulnerability has been resolved:
net: pktgen: fix access outside of user given buffer in pktgen_thread_write()
Honour the user given buffer size for the strn_len() calls (otherwise
strn_len() will access memory outside of the user given buffer).
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
► | Linux | Linux |
Version: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 Version: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 Version: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 Version: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 Version: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 Version: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 Version: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 Version: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 |
|
{ "containers": { "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "net/core/pktgen.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "a3d89f1cfe1e6d4bb164db2595511fd33db21900", "status": "affected", "version": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", "versionType": "git" }, { "lessThan": "5bfa81539e22af4c40ae5d43d7212253462383a6", "status": "affected", "version": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", "versionType": "git" }, { "lessThan": "128cdb617a87767c29be43e4431129942fce41df", "status": "affected", "version": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", "versionType": "git" }, { "lessThan": "ef1158a6a650ecee72ab40851b1d52e04d3f9cb5", "status": "affected", "version": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", "versionType": "git" }, { "lessThan": "c81c2ee1c3b050ed5c4e92876590cc7a259183f6", "status": "affected", "version": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", "versionType": "git" }, { "lessThan": "6b1d3e9db82d01a88de1795b879df67c2116b4f4", "status": "affected", "version": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", "versionType": "git" }, { "lessThan": "8fef258b555c75a467a6b4b7e3a3cbc46d5f4102", "status": "affected", "version": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", "versionType": "git" }, { "lessThan": "425e64440ad0a2f03bdaf04be0ae53dededbaa77", "status": "affected", "version": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "net/core/pktgen.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThanOrEqual": "5.4.*", "status": "unaffected", "version": "5.4.294", "versionType": "semver" }, { "lessThanOrEqual": "5.10.*", "status": "unaffected", "version": "5.10.238", "versionType": "semver" }, { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.185", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.141", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.93", "versionType": "semver" }, { "lessThanOrEqual": "6.12.*", "status": "unaffected", "version": "6.12.31", "versionType": "semver" }, { "lessThanOrEqual": "6.14.*", "status": "unaffected", "version": "6.14.9", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.15", "versionType": "original_commit_for_fix" } ] } ], "cpeApplicability": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "5.4.294", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "5.10.238", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "5.15.185", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.1.141", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.6.93", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.12.31", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.14.9", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.15", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: pktgen: fix access outside of user given buffer in pktgen_thread_write()\n\nHonour the user given buffer size for the strn_len() calls (otherwise\nstrn_len() will access memory outside of the user given buffer)." } ], "providerMetadata": { "dateUpdated": "2025-06-18T09:33:40.241Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/a3d89f1cfe1e6d4bb164db2595511fd33db21900" }, { "url": "https://git.kernel.org/stable/c/5bfa81539e22af4c40ae5d43d7212253462383a6" }, { "url": "https://git.kernel.org/stable/c/128cdb617a87767c29be43e4431129942fce41df" }, { "url": "https://git.kernel.org/stable/c/ef1158a6a650ecee72ab40851b1d52e04d3f9cb5" }, { "url": "https://git.kernel.org/stable/c/c81c2ee1c3b050ed5c4e92876590cc7a259183f6" }, { "url": "https://git.kernel.org/stable/c/6b1d3e9db82d01a88de1795b879df67c2116b4f4" }, { "url": "https://git.kernel.org/stable/c/8fef258b555c75a467a6b4b7e3a3cbc46d5f4102" }, { "url": "https://git.kernel.org/stable/c/425e64440ad0a2f03bdaf04be0ae53dededbaa77" } ], "title": "net: pktgen: fix access outside of user given buffer in pktgen_thread_write()", "x_generator": { "engine": "bippy-1.2.0" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2025-38061", "datePublished": "2025-06-18T09:33:40.241Z", "dateReserved": "2025-04-16T04:51:23.979Z", "dateUpdated": "2025-06-18T09:33:40.241Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2025-38061\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-06-18T10:15:38.960\",\"lastModified\":\"2025-06-18T13:46:52.973\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nnet: pktgen: fix access outside of user given buffer in pktgen_thread_write()\\n\\nHonour the user given buffer size for the strn_len() calls (otherwise\\nstrn_len() will access memory outside of the user given buffer).\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: pktgen: corrige el acceso fuera del b\u00fafer dado por el usuario en pktgen_thread_write() Respeta el tama\u00f1o del b\u00fafer dado por el usuario para las llamadas strn_len() (de lo contrario, strn_len() acceder\u00e1 a la memoria fuera del b\u00fafer dado por el usuario).\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/128cdb617a87767c29be43e4431129942fce41df\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/425e64440ad0a2f03bdaf04be0ae53dededbaa77\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/5bfa81539e22af4c40ae5d43d7212253462383a6\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/6b1d3e9db82d01a88de1795b879df67c2116b4f4\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/8fef258b555c75a467a6b4b7e3a3cbc46d5f4102\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/a3d89f1cfe1e6d4bb164db2595511fd33db21900\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/c81c2ee1c3b050ed5c4e92876590cc7a259183f6\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/ef1158a6a650ecee72ab40851b1d52e04d3f9cb5\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}" } }
fkie_cve-2025-38061
Vulnerability from fkie_nvd
Published
2025-06-18 10:15
Modified
2025-06-18 13:46
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved:
net: pktgen: fix access outside of user given buffer in pktgen_thread_write()
Honour the user given buffer size for the strn_len() calls (otherwise
strn_len() will access memory outside of the user given buffer).
References
▶ | URL | Tags | |
---|---|---|---|
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/128cdb617a87767c29be43e4431129942fce41df | ||
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/425e64440ad0a2f03bdaf04be0ae53dededbaa77 | ||
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/5bfa81539e22af4c40ae5d43d7212253462383a6 | ||
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/6b1d3e9db82d01a88de1795b879df67c2116b4f4 | ||
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/8fef258b555c75a467a6b4b7e3a3cbc46d5f4102 | ||
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/a3d89f1cfe1e6d4bb164db2595511fd33db21900 | ||
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/c81c2ee1c3b050ed5c4e92876590cc7a259183f6 | ||
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/ef1158a6a650ecee72ab40851b1d52e04d3f9cb5 |
Impacted products
Vendor | Product | Version |
---|
{ "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: pktgen: fix access outside of user given buffer in pktgen_thread_write()\n\nHonour the user given buffer size for the strn_len() calls (otherwise\nstrn_len() will access memory outside of the user given buffer)." }, { "lang": "es", "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: pktgen: corrige el acceso fuera del b\u00fafer dado por el usuario en pktgen_thread_write() Respeta el tama\u00f1o del b\u00fafer dado por el usuario para las llamadas strn_len() (de lo contrario, strn_len() acceder\u00e1 a la memoria fuera del b\u00fafer dado por el usuario)." } ], "id": "CVE-2025-38061", "lastModified": "2025-06-18T13:46:52.973", "metrics": {}, "published": "2025-06-18T10:15:38.960", "references": [ { "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "url": "https://git.kernel.org/stable/c/128cdb617a87767c29be43e4431129942fce41df" }, { "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "url": "https://git.kernel.org/stable/c/425e64440ad0a2f03bdaf04be0ae53dededbaa77" }, { "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "url": "https://git.kernel.org/stable/c/5bfa81539e22af4c40ae5d43d7212253462383a6" }, { "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "url": "https://git.kernel.org/stable/c/6b1d3e9db82d01a88de1795b879df67c2116b4f4" }, { "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "url": "https://git.kernel.org/stable/c/8fef258b555c75a467a6b4b7e3a3cbc46d5f4102" }, { "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "url": "https://git.kernel.org/stable/c/a3d89f1cfe1e6d4bb164db2595511fd33db21900" }, { "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "url": "https://git.kernel.org/stable/c/c81c2ee1c3b050ed5c4e92876590cc7a259183f6" }, { "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "url": "https://git.kernel.org/stable/c/ef1158a6a650ecee72ab40851b1d52e04d3f9cb5" } ], "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "vulnStatus": "Awaiting Analysis" }
suse-su-2025:02334-1
Vulnerability from csaf_suse
Published
2025-07-16 13:46
Modified
2025-07-16 13:46
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security bugfixes.
The following security bugs were fixed:
- CVE-2021-47212: net/mlx5: Update error handler for UCTX and UMEM (bsc#1222709).
- CVE-2021-47455: ptp: Fix possible memory leak in ptp_clock_register() (bsc#1225254).
- CVE-2021-47527: serial: core: fix transmit-buffer reset and memleak (bsc#1227768).
- CVE-2022-21546: scsi: target: Fix WRITE_SAME No Data Buffer crash (bsc#1242243).
- CVE-2022-49154: KVM: SVM: fix panic on out-of-bounds guest IRQ (bsc#1238167).
- CVE-2022-49622: netfilter: nf_tables: fix crash when nf_trace is enabled (bsc#1239042).
- CVE-2022-49731: ata: libata-core: fix NULL pointer deref in ata_host_alloc_pinfo() (bsc#1239071).
- CVE-2022-49764: kABI: workaround 'bpf: Prevent bpf program recursion for raw tracepoint probes' changes (bsc#1242301).
- CVE-2022-49780: scsi: target: tcm_loop: Fix possible name leak in tcm_loop_setup_hba_bus() (bsc#1242262).
- CVE-2022-49814: kcm: close race conditions on sk_receive_queue (bsc#1242498).
- CVE-2022-49879: ext4: fix BUG_ON() when directory entry has invalid rec_len (bsc#1242733).
- CVE-2022-49881: wifi: cfg80211: fix memory leak in query_regdb_file() (bsc#1242481).
- CVE-2022-49917: ipvs: fix WARNING in ip_vs_app_net_cleanup() (bsc#1242406).
- CVE-2022-49921: net: sched: Fix use after free in red_enqueue() (bsc#1242359).
- CVE-2022-50055: iavf: Fix adminq error handling (bsc#1245039).
- CVE-2022-50087: firmware: arm_scpi: Ensure scpi_info is not assigned if the probe fails (bsc#1245119).
- CVE-2022-50134: RDMA/hfi1: fix potential memory leak in setup_base_ctxt() (bsc#1244802).
- CVE-2022-50200: selinux: Add boundary check in put_entry() (bsc#1245149).
- CVE-2023-52500: Fixed information leaking when processing OPC_INB_SET_CONTROLLER_CONFIG command (bsc#1220883).
- CVE-2023-52927: netfilter: allow exp not to be removed in nf_ct_find_expectation (bsc#1239644).
- CVE-2023-53020: l2tp: fix lockdep splat (bsc#1240224).
- CVE-2023-53090: drm/amdkfd: Fix an illegal memory access (bsc#1242753).
- CVE-2023-53091: ext4: update s_journal_inum if it changes after journal replay (bsc#1242767).
- CVE-2023-53133: bpf, sockmap: Fix an infinite loop error when len is 0 in tcp_bpf_recvmsg_parser() (bsc#1242423).
- CVE-2024-26586: mlxsw: spectrum_acl_tcam: Fix stack corruption (bsc#1220243).
- CVE-2024-26825: nfc: nci: free rx_data_reassembly skb on NCI device cleanup (bsc#1223065).
- CVE-2024-26872: RDMA/srpt: Do not register event handler until srpt device is fully setup (bsc#1223115).
- CVE-2024-26875: media: pvrusb2: fix uaf in pvr2_context_set_notify (bsc#1223118).
- CVE-2024-35790: usb: typec: altmodes/displayport: create sysfs nodes as driver's default device attribute group (bsc#1224712).
- CVE-2024-35839: kABI fix for netfilter: bridge: replace physindev with physinif in nf_bridge_info (bsc#1224726).
- CVE-2024-38588: ftrace: Fix possible use-after-free issue in ftrace_location() (bsc#1226837).
- CVE-2024-57982: xfrm: state: fix out-of-bounds read during lookup (bsc#1237913).
- CVE-2025-21898: ftrace: Avoid potential division by zero in function_stat_show() (bsc#1240610).
- CVE-2025-21920: vlan: enforce underlying device type (bsc#1240686).
- CVE-2025-21971: net_sched: Prevent creation of classes with TC_H_ROOT (bsc#1240799).
- CVE-2025-22035: tracing: Fix use-after-free in print_graph_function_flags during tracer switching (bsc#1241544).
- CVE-2025-23149: tpm: do not start chip while suspended (bsc#1242758).
- CVE-2025-37756: net: tls: explicitly disallow disconnect (bsc#1242515).
- CVE-2025-37757: tipc: fix memory leak in tipc_link_xmit (bsc#1242521).
- CVE-2025-37781: i2c: cros-ec-tunnel: defer probe if parent EC is not present (bsc#1242575).
- CVE-2025-37800: driver core: fix potential NULL pointer dereference in dev_uevent() (bsc#1242849).
- CVE-2025-37810: usb: dwc3: gadget: check that event count does not exceed event buffer length (bsc#1242906).
- CVE-2025-37836: PCI: Fix reference leak in pci_register_host_bridge() (bsc#1242957).
- CVE-2025-37844: cifs: avoid NULL pointer dereference in dbg call (bsc#1242946).
- CVE-2025-37862: HID: pidff: Fix null pointer dereference in pidff_find_fields (bsc#1242982).
- CVE-2025-37892: mtd: inftlcore: Add error check for inftl_read_oob() (bsc#1243536).
- CVE-2025-37911: bnxt_en: Fix out-of-bound memcpy() during ethtool -w (bsc#1243469).
- CVE-2025-37923: tracing: Fix oob write in trace_seq_to_buffer() (bsc#1243551).
- CVE-2025-37927: iommu/amd: Fix potential buffer overflow in parse_ivrs_acpihid (bsc#1243620).
- CVE-2025-37928: dm-bufio: do not schedule in atomic context (bsc#1243621).
- CVE-2025-37961: ipvs: fix uninit-value for saddr in do_output_route4 (bsc#1243523).
- CVE-2025-37980: block: fix resource leak in blk_register_queue() error path (bsc#1243522).
- CVE-2025-37982: wifi: wl1251: fix memory leak in wl1251_tx_work (bsc#1243524).
- CVE-2025-37992: net_sched: Flush gso_skb list too during ->change() (bsc#1243698).
- CVE-2025-37995: module: ensure that kobject_put() is safe for module type kobjects (bsc#1243827).
- CVE-2025-37998: openvswitch: Fix unsafe attribute parsing in output_userspace() (bsc#1243836).
- CVE-2025-38000: sch_hfsc: Fix qlen accounting bug when using peek in hfsc_enqueue() (bsc#1244277).
- CVE-2025-38004: can: bcm: add locking for bcm_op runtime updates (bsc#1244274).
- CVE-2025-38023: nfs: handle failure of nfs_get_lock_context in unlock path (bsc#1245004).
- CVE-2025-38024: RDMA/rxe: Fix slab-use-after-free Read in rxe_queue_cleanup bug (bsc#1245025).
- CVE-2025-38061: net: pktgen: fix access outside of user given buffer in pktgen_thread_write() (bsc#1245440).
- CVE-2025-38072: libnvdimm/labels: Fix divide error in nd_label_data_init() (bsc#1244743).
- CVE-2025-38078: ALSA: pcm: Fix race of buffer access at PCM OSS layer (bsc#1244737).
- CVE-2025-38083: net_sched: prio: fix a race in prio_tune() (bsc#1245183).
The following non-security bugs were fixed:
- ftrace: Fix possible warning on checking all pages used in ftrace_process_locs() (bsc#1226837).
- ftrace: Return the first found result in lookup_rec() (bsc#1226837).
- ftrace: Separate out functionality from ftrace_location_range() (bsc#1226837).
- ftrace: Zero out ftrace hashes when a module is removed (bsc#1226837).
- mnt: fix __detach_mounts infinite loop (bsc#1242140).
- net_sched: sch_fifo: implement lockless __fifo_dump() (bsc#1237312)
- netfilter: nf_tables: consolidate rule verdict trace call (bsc#1239042).
- netfilter: nf_tables: remove old nf_log based tracing (bsc#1239042).
- scsi: storvsc: Do not report the host packet status as the hv status (git-fixes).
- scsi: storvsc: Increase the timeouts to storvsc_timeout (bsc#1245455).
- tracing: Fix compilation warning on arm32 (bsc#1243551).
Patchnames
SUSE-2025-2334,SUSE-SLE-Live-Patching-12-SP5-2025-2334,SUSE-SLE-SERVER-12-SP5-LTSS-2025-2334,SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-2334
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\nThe SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2021-47212: net/mlx5: Update error handler for UCTX and UMEM (bsc#1222709).\n- CVE-2021-47455: ptp: Fix possible memory leak in ptp_clock_register() (bsc#1225254).\n- CVE-2021-47527: serial: core: fix transmit-buffer reset and memleak (bsc#1227768).\n- CVE-2022-21546: scsi: target: Fix WRITE_SAME No Data Buffer crash (bsc#1242243).\n- CVE-2022-49154: KVM: SVM: fix panic on out-of-bounds guest IRQ (bsc#1238167).\n- CVE-2022-49622: netfilter: nf_tables: fix crash when nf_trace is enabled (bsc#1239042).\n- CVE-2022-49731: ata: libata-core: fix NULL pointer deref in ata_host_alloc_pinfo() (bsc#1239071).\n- CVE-2022-49764: kABI: workaround \u0027bpf: Prevent bpf program recursion for raw tracepoint probes\u0027 changes (bsc#1242301).\n- CVE-2022-49780: scsi: target: tcm_loop: Fix possible name leak in tcm_loop_setup_hba_bus() (bsc#1242262).\n- CVE-2022-49814: kcm: close race conditions on sk_receive_queue (bsc#1242498).\n- CVE-2022-49879: ext4: fix BUG_ON() when directory entry has invalid rec_len (bsc#1242733).\n- CVE-2022-49881: wifi: cfg80211: fix memory leak in query_regdb_file() (bsc#1242481).\n- CVE-2022-49917: ipvs: fix WARNING in ip_vs_app_net_cleanup() (bsc#1242406).\n- CVE-2022-49921: net: sched: Fix use after free in red_enqueue() (bsc#1242359).\n- CVE-2022-50055: iavf: Fix adminq error handling (bsc#1245039).\n- CVE-2022-50087: firmware: arm_scpi: Ensure scpi_info is not assigned if the probe fails (bsc#1245119).\n- CVE-2022-50134: RDMA/hfi1: fix potential memory leak in setup_base_ctxt() (bsc#1244802).\n- CVE-2022-50200: selinux: Add boundary check in put_entry() (bsc#1245149).\n- CVE-2023-52500: Fixed information leaking when processing OPC_INB_SET_CONTROLLER_CONFIG command (bsc#1220883).\n- CVE-2023-52927: netfilter: allow exp not to be removed in nf_ct_find_expectation (bsc#1239644).\n- CVE-2023-53020: l2tp: fix lockdep splat (bsc#1240224).\n- CVE-2023-53090: drm/amdkfd: Fix an illegal memory access (bsc#1242753).\n- CVE-2023-53091: ext4: update s_journal_inum if it changes after journal replay (bsc#1242767).\n- CVE-2023-53133: bpf, sockmap: Fix an infinite loop error when len is 0 in tcp_bpf_recvmsg_parser() (bsc#1242423).\n- CVE-2024-26586: mlxsw: spectrum_acl_tcam: Fix stack corruption (bsc#1220243).\n- CVE-2024-26825: nfc: nci: free rx_data_reassembly skb on NCI device cleanup (bsc#1223065).\n- CVE-2024-26872: RDMA/srpt: Do not register event handler until srpt device is fully setup (bsc#1223115).\n- CVE-2024-26875: media: pvrusb2: fix uaf in pvr2_context_set_notify (bsc#1223118).\n- CVE-2024-35790: usb: typec: altmodes/displayport: create sysfs nodes as driver\u0027s default device attribute group (bsc#1224712).\n- CVE-2024-35839: kABI fix for netfilter: bridge: replace physindev with physinif in nf_bridge_info (bsc#1224726).\n- CVE-2024-38588: ftrace: Fix possible use-after-free issue in ftrace_location() (bsc#1226837).\n- CVE-2024-57982: xfrm: state: fix out-of-bounds read during lookup (bsc#1237913).\n- CVE-2025-21898: ftrace: Avoid potential division by zero in function_stat_show() (bsc#1240610).\n- CVE-2025-21920: vlan: enforce underlying device type (bsc#1240686).\n- CVE-2025-21971: net_sched: Prevent creation of classes with TC_H_ROOT (bsc#1240799).\n- CVE-2025-22035: tracing: Fix use-after-free in print_graph_function_flags during tracer switching (bsc#1241544).\n- CVE-2025-23149: tpm: do not start chip while suspended (bsc#1242758).\n- CVE-2025-37756: net: tls: explicitly disallow disconnect (bsc#1242515).\n- CVE-2025-37757: tipc: fix memory leak in tipc_link_xmit (bsc#1242521).\n- CVE-2025-37781: i2c: cros-ec-tunnel: defer probe if parent EC is not present (bsc#1242575).\n- CVE-2025-37800: driver core: fix potential NULL pointer dereference in dev_uevent() (bsc#1242849).\n- CVE-2025-37810: usb: dwc3: gadget: check that event count does not exceed event buffer length (bsc#1242906).\n- CVE-2025-37836: PCI: Fix reference leak in pci_register_host_bridge() (bsc#1242957).\n- CVE-2025-37844: cifs: avoid NULL pointer dereference in dbg call (bsc#1242946).\n- CVE-2025-37862: HID: pidff: Fix null pointer dereference in pidff_find_fields (bsc#1242982).\n- CVE-2025-37892: mtd: inftlcore: Add error check for inftl_read_oob() (bsc#1243536).\n- CVE-2025-37911: bnxt_en: Fix out-of-bound memcpy() during ethtool -w (bsc#1243469).\n- CVE-2025-37923: tracing: Fix oob write in trace_seq_to_buffer() (bsc#1243551).\n- CVE-2025-37927: iommu/amd: Fix potential buffer overflow in parse_ivrs_acpihid (bsc#1243620).\n- CVE-2025-37928: dm-bufio: do not schedule in atomic context (bsc#1243621).\n- CVE-2025-37961: ipvs: fix uninit-value for saddr in do_output_route4 (bsc#1243523).\n- CVE-2025-37980: block: fix resource leak in blk_register_queue() error path (bsc#1243522).\n- CVE-2025-37982: wifi: wl1251: fix memory leak in wl1251_tx_work (bsc#1243524).\n- CVE-2025-37992: net_sched: Flush gso_skb list too during -\u003echange() (bsc#1243698).\n- CVE-2025-37995: module: ensure that kobject_put() is safe for module type kobjects (bsc#1243827).\n- CVE-2025-37998: openvswitch: Fix unsafe attribute parsing in output_userspace() (bsc#1243836).\n- CVE-2025-38000: sch_hfsc: Fix qlen accounting bug when using peek in hfsc_enqueue() (bsc#1244277).\n- CVE-2025-38004: can: bcm: add locking for bcm_op runtime updates (bsc#1244274).\n- CVE-2025-38023: nfs: handle failure of nfs_get_lock_context in unlock path (bsc#1245004).\n- CVE-2025-38024: RDMA/rxe: Fix slab-use-after-free Read in rxe_queue_cleanup bug (bsc#1245025).\n- CVE-2025-38061: net: pktgen: fix access outside of user given buffer in pktgen_thread_write() (bsc#1245440).\n- CVE-2025-38072: libnvdimm/labels: Fix divide error in nd_label_data_init() (bsc#1244743).\n- CVE-2025-38078: ALSA: pcm: Fix race of buffer access at PCM OSS layer (bsc#1244737).\n- CVE-2025-38083: net_sched: prio: fix a race in prio_tune() (bsc#1245183).\n\nThe following non-security bugs were fixed:\n\n- ftrace: Fix possible warning on checking all pages used in ftrace_process_locs() (bsc#1226837).\n- ftrace: Return the first found result in lookup_rec() (bsc#1226837).\n- ftrace: Separate out functionality from ftrace_location_range() (bsc#1226837).\n- ftrace: Zero out ftrace hashes when a module is removed (bsc#1226837).\n- mnt: fix __detach_mounts infinite loop (bsc#1242140).\n- net_sched: sch_fifo: implement lockless __fifo_dump() (bsc#1237312)\n- netfilter: nf_tables: consolidate rule verdict trace call (bsc#1239042).\n- netfilter: nf_tables: remove old nf_log based tracing (bsc#1239042).\n- scsi: storvsc: Do not report the host packet status as the hv status (git-fixes).\n- scsi: storvsc: Increase the timeouts to storvsc_timeout (bsc#1245455).\n- tracing: Fix compilation warning on arm32 (bsc#1243551).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2025-2334,SUSE-SLE-Live-Patching-12-SP5-2025-2334,SUSE-SLE-SERVER-12-SP5-LTSS-2025-2334,SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-2334", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_02334-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2025:02334-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202502334-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2025:02334-1", "url": "https://lists.suse.com/pipermail/sle-updates/2025-July/040737.html" }, { "category": "self", "summary": "SUSE Bug 1154048", "url": "https://bugzilla.suse.com/1154048" }, { "category": "self", "summary": "SUSE Bug 1190317", "url": "https://bugzilla.suse.com/1190317" }, { "category": "self", "summary": "SUSE Bug 1199487", "url": "https://bugzilla.suse.com/1199487" }, { "category": "self", "summary": "SUSE Bug 1201958", "url": "https://bugzilla.suse.com/1201958" }, { "category": "self", "summary": "SUSE Bug 1202095", "url": "https://bugzilla.suse.com/1202095" }, { "category": "self", "summary": "SUSE Bug 1202716", "url": "https://bugzilla.suse.com/1202716" }, { "category": "self", "summary": "SUSE Bug 1203254", "url": "https://bugzilla.suse.com/1203254" }, { "category": "self", "summary": "SUSE Bug 1205220", "url": "https://bugzilla.suse.com/1205220" }, { "category": "self", "summary": "SUSE Bug 1205514", "url": "https://bugzilla.suse.com/1205514" }, { "category": "self", "summary": "SUSE Bug 1206664", "url": "https://bugzilla.suse.com/1206664" }, { "category": "self", "summary": "SUSE Bug 1206878", "url": "https://bugzilla.suse.com/1206878" }, { "category": "self", "summary": "SUSE Bug 1206880", "url": "https://bugzilla.suse.com/1206880" }, { "category": "self", "summary": "SUSE Bug 1208542", "url": "https://bugzilla.suse.com/1208542" }, { "category": "self", "summary": "SUSE Bug 1210336", "url": "https://bugzilla.suse.com/1210336" }, { "category": "self", "summary": "SUSE Bug 1211226", "url": "https://bugzilla.suse.com/1211226" }, { "category": "self", "summary": "SUSE Bug 1212051", "url": "https://bugzilla.suse.com/1212051" }, { "category": "self", "summary": "SUSE Bug 1218184", "url": "https://bugzilla.suse.com/1218184" }, { "category": "self", "summary": "SUSE Bug 1220243", "url": "https://bugzilla.suse.com/1220243" }, { "category": "self", "summary": "SUSE Bug 1220883", "url": "https://bugzilla.suse.com/1220883" }, { "category": "self", "summary": "SUSE Bug 1222709", "url": "https://bugzilla.suse.com/1222709" }, { "category": "self", "summary": "SUSE Bug 1223065", "url": "https://bugzilla.suse.com/1223065" }, { "category": "self", "summary": "SUSE Bug 1223115", "url": "https://bugzilla.suse.com/1223115" }, { "category": "self", "summary": "SUSE Bug 1223118", "url": "https://bugzilla.suse.com/1223118" }, { "category": "self", "summary": "SUSE Bug 1224712", "url": "https://bugzilla.suse.com/1224712" }, { "category": "self", "summary": "SUSE Bug 1224726", "url": "https://bugzilla.suse.com/1224726" }, { "category": "self", "summary": "SUSE Bug 1225254", "url": "https://bugzilla.suse.com/1225254" }, { "category": "self", "summary": "SUSE Bug 1225839", "url": "https://bugzilla.suse.com/1225839" }, { "category": "self", "summary": "SUSE Bug 1226837", "url": "https://bugzilla.suse.com/1226837" }, { "category": "self", "summary": "SUSE Bug 1227768", "url": "https://bugzilla.suse.com/1227768" }, { "category": "self", "summary": "SUSE Bug 1228659", "url": "https://bugzilla.suse.com/1228659" }, { "category": "self", "summary": "SUSE Bug 1231293", "url": "https://bugzilla.suse.com/1231293" }, { "category": "self", "summary": "SUSE Bug 1234454", "url": "https://bugzilla.suse.com/1234454" }, { "category": "self", "summary": "SUSE Bug 1237312", "url": "https://bugzilla.suse.com/1237312" }, { "category": "self", "summary": "SUSE Bug 1237913", "url": "https://bugzilla.suse.com/1237913" }, { "category": "self", "summary": "SUSE Bug 1238167", "url": "https://bugzilla.suse.com/1238167" }, { "category": "self", "summary": "SUSE Bug 1238275", "url": "https://bugzilla.suse.com/1238275" }, { "category": "self", "summary": "SUSE Bug 1238303", "url": "https://bugzilla.suse.com/1238303" }, { "category": "self", "summary": "SUSE Bug 1238570", "url": "https://bugzilla.suse.com/1238570" }, { "category": "self", "summary": "SUSE Bug 1239042", "url": "https://bugzilla.suse.com/1239042" }, { "category": "self", "summary": "SUSE Bug 1239071", "url": "https://bugzilla.suse.com/1239071" }, { "category": "self", "summary": "SUSE Bug 1239644", "url": "https://bugzilla.suse.com/1239644" }, { "category": "self", "summary": "SUSE Bug 1239986", "url": "https://bugzilla.suse.com/1239986" }, { "category": "self", "summary": "SUSE Bug 1240224", "url": "https://bugzilla.suse.com/1240224" }, { "category": "self", "summary": "SUSE Bug 1240610", "url": "https://bugzilla.suse.com/1240610" }, { "category": "self", "summary": "SUSE Bug 1240686", "url": "https://bugzilla.suse.com/1240686" }, { "category": "self", "summary": "SUSE Bug 1240785", "url": "https://bugzilla.suse.com/1240785" }, { "category": "self", "summary": "SUSE Bug 1240799", "url": "https://bugzilla.suse.com/1240799" }, { "category": "self", "summary": "SUSE Bug 1241038", "url": "https://bugzilla.suse.com/1241038" }, { "category": "self", "summary": "SUSE Bug 1241544", "url": "https://bugzilla.suse.com/1241544" }, { "category": "self", "summary": "SUSE Bug 1242140", "url": "https://bugzilla.suse.com/1242140" }, { "category": "self", "summary": "SUSE Bug 1242154", "url": "https://bugzilla.suse.com/1242154" }, { "category": "self", "summary": "SUSE Bug 1242216", "url": "https://bugzilla.suse.com/1242216" }, { "category": "self", "summary": "SUSE Bug 1242243", "url": "https://bugzilla.suse.com/1242243" }, { "category": "self", "summary": "SUSE Bug 1242262", "url": "https://bugzilla.suse.com/1242262" }, { "category": "self", "summary": "SUSE Bug 1242281", "url": "https://bugzilla.suse.com/1242281" }, { "category": "self", "summary": "SUSE Bug 1242301", "url": "https://bugzilla.suse.com/1242301" }, { "category": "self", "summary": "SUSE Bug 1242359", "url": "https://bugzilla.suse.com/1242359" }, { "category": "self", "summary": "SUSE Bug 1242406", "url": "https://bugzilla.suse.com/1242406" }, { "category": "self", "summary": "SUSE Bug 1242423", "url": "https://bugzilla.suse.com/1242423" }, { "category": "self", "summary": "SUSE Bug 1242481", "url": "https://bugzilla.suse.com/1242481" }, { "category": "self", "summary": "SUSE Bug 1242498", "url": "https://bugzilla.suse.com/1242498" }, { "category": "self", "summary": "SUSE Bug 1242504", "url": "https://bugzilla.suse.com/1242504" }, { "category": "self", "summary": "SUSE Bug 1242515", "url": "https://bugzilla.suse.com/1242515" }, { "category": "self", "summary": "SUSE Bug 1242521", "url": "https://bugzilla.suse.com/1242521" }, { "category": "self", "summary": "SUSE Bug 1242575", "url": "https://bugzilla.suse.com/1242575" }, { "category": "self", "summary": "SUSE Bug 1242733", "url": "https://bugzilla.suse.com/1242733" }, { "category": "self", "summary": "SUSE Bug 1242753", "url": "https://bugzilla.suse.com/1242753" }, { "category": "self", "summary": "SUSE Bug 1242758", "url": "https://bugzilla.suse.com/1242758" }, { "category": "self", "summary": "SUSE Bug 1242767", "url": "https://bugzilla.suse.com/1242767" }, { "category": "self", "summary": "SUSE Bug 1242778", "url": "https://bugzilla.suse.com/1242778" }, { "category": "self", "summary": "SUSE Bug 1242849", "url": "https://bugzilla.suse.com/1242849" }, { "category": "self", "summary": "SUSE Bug 1242906", "url": "https://bugzilla.suse.com/1242906" }, { "category": "self", "summary": "SUSE Bug 1242946", "url": "https://bugzilla.suse.com/1242946" }, { "category": "self", "summary": "SUSE Bug 1242957", "url": "https://bugzilla.suse.com/1242957" }, { "category": "self", "summary": "SUSE Bug 1242982", "url": "https://bugzilla.suse.com/1242982" }, { "category": "self", "summary": "SUSE Bug 1243047", "url": "https://bugzilla.suse.com/1243047" }, { "category": "self", "summary": "SUSE Bug 1243469", "url": "https://bugzilla.suse.com/1243469" }, { "category": "self", "summary": "SUSE Bug 1243522", "url": "https://bugzilla.suse.com/1243522" }, { "category": "self", "summary": "SUSE Bug 1243523", "url": "https://bugzilla.suse.com/1243523" }, { "category": "self", "summary": "SUSE Bug 1243524", "url": "https://bugzilla.suse.com/1243524" }, { "category": "self", "summary": "SUSE Bug 1243536", "url": "https://bugzilla.suse.com/1243536" }, { "category": "self", "summary": "SUSE Bug 1243551", "url": "https://bugzilla.suse.com/1243551" }, { "category": "self", "summary": "SUSE Bug 1243620", "url": "https://bugzilla.suse.com/1243620" }, { "category": "self", "summary": "SUSE Bug 1243621", "url": "https://bugzilla.suse.com/1243621" }, { "category": "self", "summary": "SUSE Bug 1243698", "url": "https://bugzilla.suse.com/1243698" }, { "category": "self", "summary": "SUSE Bug 1243827", "url": "https://bugzilla.suse.com/1243827" }, { "category": "self", "summary": "SUSE Bug 1243836", "url": "https://bugzilla.suse.com/1243836" }, { "category": "self", "summary": "SUSE Bug 1244241", "url": "https://bugzilla.suse.com/1244241" }, { "category": "self", "summary": "SUSE Bug 1244274", "url": "https://bugzilla.suse.com/1244274" }, { "category": "self", "summary": "SUSE Bug 1244277", "url": "https://bugzilla.suse.com/1244277" }, { "category": "self", "summary": "SUSE Bug 1244317", "url": "https://bugzilla.suse.com/1244317" }, { "category": "self", "summary": "SUSE Bug 1244337", "url": "https://bugzilla.suse.com/1244337" }, { "category": "self", "summary": "SUSE Bug 1244737", "url": "https://bugzilla.suse.com/1244737" }, { "category": "self", "summary": "SUSE Bug 1244743", "url": "https://bugzilla.suse.com/1244743" }, { "category": "self", "summary": "SUSE Bug 1244783", "url": "https://bugzilla.suse.com/1244783" }, { "category": "self", "summary": "SUSE Bug 1244786", "url": "https://bugzilla.suse.com/1244786" }, { "category": "self", "summary": "SUSE Bug 1244788", "url": "https://bugzilla.suse.com/1244788" }, { "category": "self", "summary": "SUSE Bug 1244802", "url": "https://bugzilla.suse.com/1244802" }, { "category": "self", "summary": "SUSE Bug 1244813", "url": "https://bugzilla.suse.com/1244813" }, { "category": "self", "summary": "SUSE Bug 1244820", "url": "https://bugzilla.suse.com/1244820" }, { "category": "self", "summary": "SUSE Bug 1244836", "url": "https://bugzilla.suse.com/1244836" }, { "category": "self", "summary": "SUSE Bug 1244838", "url": "https://bugzilla.suse.com/1244838" }, { "category": "self", "summary": "SUSE Bug 1244839", "url": "https://bugzilla.suse.com/1244839" }, { "category": "self", "summary": "SUSE Bug 1244841", "url": "https://bugzilla.suse.com/1244841" }, { "category": "self", "summary": "SUSE Bug 1244842", "url": "https://bugzilla.suse.com/1244842" }, { "category": "self", "summary": "SUSE Bug 1244845", "url": "https://bugzilla.suse.com/1244845" }, { "category": "self", "summary": "SUSE Bug 1244848", "url": "https://bugzilla.suse.com/1244848" }, { "category": "self", "summary": "SUSE Bug 1244849", "url": "https://bugzilla.suse.com/1244849" }, { "category": "self", "summary": "SUSE Bug 1244851", "url": "https://bugzilla.suse.com/1244851" }, { "category": "self", "summary": "SUSE Bug 1244867", "url": "https://bugzilla.suse.com/1244867" }, { "category": "self", "summary": "SUSE Bug 1244884", "url": "https://bugzilla.suse.com/1244884" }, { "category": "self", "summary": "SUSE Bug 1244885", "url": "https://bugzilla.suse.com/1244885" }, { "category": "self", "summary": "SUSE Bug 1244886", "url": "https://bugzilla.suse.com/1244886" }, { "category": "self", "summary": "SUSE Bug 1244901", "url": "https://bugzilla.suse.com/1244901" }, { "category": "self", "summary": "SUSE Bug 1244936", "url": "https://bugzilla.suse.com/1244936" }, { "category": "self", "summary": "SUSE Bug 1244948", "url": "https://bugzilla.suse.com/1244948" }, { "category": "self", "summary": "SUSE Bug 1244966", "url": "https://bugzilla.suse.com/1244966" }, { "category": "self", "summary": "SUSE Bug 1244967", "url": "https://bugzilla.suse.com/1244967" }, { "category": "self", "summary": "SUSE Bug 1244968", "url": "https://bugzilla.suse.com/1244968" }, { "category": "self", "summary": "SUSE Bug 1244969", "url": "https://bugzilla.suse.com/1244969" }, { "category": "self", "summary": "SUSE Bug 1244976", "url": "https://bugzilla.suse.com/1244976" }, { "category": "self", "summary": "SUSE Bug 1244978", "url": "https://bugzilla.suse.com/1244978" }, { "category": "self", "summary": "SUSE Bug 1244984", "url": "https://bugzilla.suse.com/1244984" }, { "category": "self", "summary": "SUSE Bug 1244986", "url": "https://bugzilla.suse.com/1244986" }, { "category": "self", "summary": "SUSE Bug 1244992", "url": "https://bugzilla.suse.com/1244992" }, { "category": "self", "summary": "SUSE Bug 1245004", "url": "https://bugzilla.suse.com/1245004" }, { "category": "self", "summary": "SUSE Bug 1245009", "url": "https://bugzilla.suse.com/1245009" }, { "category": "self", "summary": "SUSE Bug 1245024", "url": "https://bugzilla.suse.com/1245024" }, { "category": "self", "summary": "SUSE Bug 1245025", "url": "https://bugzilla.suse.com/1245025" }, { "category": "self", "summary": "SUSE Bug 1245039", "url": "https://bugzilla.suse.com/1245039" }, { "category": "self", "summary": "SUSE Bug 1245047", "url": "https://bugzilla.suse.com/1245047" }, { "category": "self", "summary": "SUSE Bug 1245057", "url": "https://bugzilla.suse.com/1245057" }, { "category": "self", "summary": "SUSE Bug 1245117", "url": "https://bugzilla.suse.com/1245117" }, { "category": "self", "summary": "SUSE Bug 1245119", "url": "https://bugzilla.suse.com/1245119" }, { "category": "self", "summary": "SUSE Bug 1245125", "url": "https://bugzilla.suse.com/1245125" }, { "category": "self", "summary": "SUSE Bug 1245129", "url": "https://bugzilla.suse.com/1245129" }, { "category": "self", "summary": "SUSE Bug 1245131", "url": "https://bugzilla.suse.com/1245131" }, { "category": "self", "summary": "SUSE Bug 1245138", "url": "https://bugzilla.suse.com/1245138" }, { "category": "self", "summary": "SUSE Bug 1245140", "url": "https://bugzilla.suse.com/1245140" }, { "category": "self", "summary": "SUSE Bug 1245147", "url": "https://bugzilla.suse.com/1245147" }, { "category": "self", "summary": "SUSE Bug 1245149", "url": "https://bugzilla.suse.com/1245149" }, { "category": "self", "summary": "SUSE Bug 1245152", "url": "https://bugzilla.suse.com/1245152" }, { "category": "self", "summary": "SUSE Bug 1245183", "url": "https://bugzilla.suse.com/1245183" }, { "category": "self", "summary": "SUSE Bug 1245195", "url": "https://bugzilla.suse.com/1245195" }, { "category": "self", "summary": "SUSE Bug 1245348", "url": "https://bugzilla.suse.com/1245348" }, { "category": "self", "summary": "SUSE Bug 1245440", "url": "https://bugzilla.suse.com/1245440" }, { "category": "self", "summary": "SUSE Bug 1245455", "url": "https://bugzilla.suse.com/1245455" }, { "category": "self", "summary": "SUSE CVE CVE-2021-43527 page", "url": "https://www.suse.com/security/cve/CVE-2021-43527/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-47212 page", "url": "https://www.suse.com/security/cve/CVE-2021-47212/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-47455 page", "url": "https://www.suse.com/security/cve/CVE-2021-47455/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1679 page", "url": "https://www.suse.com/security/cve/CVE-2022-1679/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21546 page", "url": "https://www.suse.com/security/cve/CVE-2022-21546/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-2586 page", "url": "https://www.suse.com/security/cve/CVE-2022-2586/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-3903 page", "url": "https://www.suse.com/security/cve/CVE-2022-3903/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-4095 page", "url": "https://www.suse.com/security/cve/CVE-2022-4095/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-4662 page", "url": "https://www.suse.com/security/cve/CVE-2022-4662/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-49154 page", "url": "https://www.suse.com/security/cve/CVE-2022-49154/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-49622 page", "url": "https://www.suse.com/security/cve/CVE-2022-49622/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-49731 page", "url": "https://www.suse.com/security/cve/CVE-2022-49731/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-49764 page", "url": "https://www.suse.com/security/cve/CVE-2022-49764/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-49780 page", "url": "https://www.suse.com/security/cve/CVE-2022-49780/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-49814 page", "url": "https://www.suse.com/security/cve/CVE-2022-49814/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-49879 page", "url": "https://www.suse.com/security/cve/CVE-2022-49879/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-49881 page", "url": "https://www.suse.com/security/cve/CVE-2022-49881/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-49917 page", "url": "https://www.suse.com/security/cve/CVE-2022-49917/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-49921 page", "url": "https://www.suse.com/security/cve/CVE-2022-49921/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-49936 page", "url": "https://www.suse.com/security/cve/CVE-2022-49936/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-49937 page", "url": "https://www.suse.com/security/cve/CVE-2022-49937/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-49938 page", "url": "https://www.suse.com/security/cve/CVE-2022-49938/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-49954 page", "url": "https://www.suse.com/security/cve/CVE-2022-49954/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-49956 page", "url": "https://www.suse.com/security/cve/CVE-2022-49956/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-49957 page", "url": "https://www.suse.com/security/cve/CVE-2022-49957/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-49977 page", "url": "https://www.suse.com/security/cve/CVE-2022-49977/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-49978 page", "url": "https://www.suse.com/security/cve/CVE-2022-49978/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-49986 page", "url": "https://www.suse.com/security/cve/CVE-2022-49986/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-49987 page", "url": "https://www.suse.com/security/cve/CVE-2022-49987/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-49990 page", "url": "https://www.suse.com/security/cve/CVE-2022-49990/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-50008 page", "url": "https://www.suse.com/security/cve/CVE-2022-50008/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-50012 page", "url": "https://www.suse.com/security/cve/CVE-2022-50012/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-50020 page", "url": "https://www.suse.com/security/cve/CVE-2022-50020/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-50022 page", "url": "https://www.suse.com/security/cve/CVE-2022-50022/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-50045 page", "url": "https://www.suse.com/security/cve/CVE-2022-50045/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-50055 page", "url": "https://www.suse.com/security/cve/CVE-2022-50055/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-50065 page", "url": "https://www.suse.com/security/cve/CVE-2022-50065/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-50067 page", "url": "https://www.suse.com/security/cve/CVE-2022-50067/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-50073 page", "url": "https://www.suse.com/security/cve/CVE-2022-50073/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-50083 page", "url": "https://www.suse.com/security/cve/CVE-2022-50083/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-50084 page", "url": "https://www.suse.com/security/cve/CVE-2022-50084/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-50085 page", "url": "https://www.suse.com/security/cve/CVE-2022-50085/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-50087 page", "url": "https://www.suse.com/security/cve/CVE-2022-50087/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-50091 page", "url": "https://www.suse.com/security/cve/CVE-2022-50091/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-50092 page", "url": "https://www.suse.com/security/cve/CVE-2022-50092/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-50093 page", "url": "https://www.suse.com/security/cve/CVE-2022-50093/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-50094 page", "url": "https://www.suse.com/security/cve/CVE-2022-50094/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-50097 page", "url": "https://www.suse.com/security/cve/CVE-2022-50097/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-50098 page", "url": "https://www.suse.com/security/cve/CVE-2022-50098/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-50099 page", "url": "https://www.suse.com/security/cve/CVE-2022-50099/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-50101 page", "url": "https://www.suse.com/security/cve/CVE-2022-50101/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-50102 page", "url": "https://www.suse.com/security/cve/CVE-2022-50102/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-50104 page", "url": "https://www.suse.com/security/cve/CVE-2022-50104/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-50109 page", "url": "https://www.suse.com/security/cve/CVE-2022-50109/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-50126 page", "url": "https://www.suse.com/security/cve/CVE-2022-50126/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-50134 page", "url": "https://www.suse.com/security/cve/CVE-2022-50134/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-50146 page", "url": "https://www.suse.com/security/cve/CVE-2022-50146/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-50152 page", "url": "https://www.suse.com/security/cve/CVE-2022-50152/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-50153 page", "url": "https://www.suse.com/security/cve/CVE-2022-50153/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-50173 page", "url": "https://www.suse.com/security/cve/CVE-2022-50173/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-50179 page", "url": "https://www.suse.com/security/cve/CVE-2022-50179/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-50181 page", "url": "https://www.suse.com/security/cve/CVE-2022-50181/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-50200 page", "url": "https://www.suse.com/security/cve/CVE-2022-50200/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-50206 page", "url": "https://www.suse.com/security/cve/CVE-2022-50206/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-50211 page", "url": "https://www.suse.com/security/cve/CVE-2022-50211/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-50213 page", "url": "https://www.suse.com/security/cve/CVE-2022-50213/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-50215 page", "url": "https://www.suse.com/security/cve/CVE-2022-50215/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-50220 page", "url": "https://www.suse.com/security/cve/CVE-2022-50220/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1989 page", "url": "https://www.suse.com/security/cve/CVE-2023-1989/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-3111 page", "url": "https://www.suse.com/security/cve/CVE-2023-3111/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-52500 page", "url": "https://www.suse.com/security/cve/CVE-2023-52500/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-52927 page", "url": "https://www.suse.com/security/cve/CVE-2023-52927/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-53020 page", "url": "https://www.suse.com/security/cve/CVE-2023-53020/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-53063 page", "url": "https://www.suse.com/security/cve/CVE-2023-53063/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-53081 page", "url": "https://www.suse.com/security/cve/CVE-2023-53081/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-53090 page", "url": "https://www.suse.com/security/cve/CVE-2023-53090/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-53091 page", "url": "https://www.suse.com/security/cve/CVE-2023-53091/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-53133 page", "url": "https://www.suse.com/security/cve/CVE-2023-53133/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-53145 page", "url": "https://www.suse.com/security/cve/CVE-2023-53145/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-26586 page", "url": "https://www.suse.com/security/cve/CVE-2024-26586/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-26825 page", "url": "https://www.suse.com/security/cve/CVE-2024-26825/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-26872 page", "url": "https://www.suse.com/security/cve/CVE-2024-26872/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-26875 page", "url": "https://www.suse.com/security/cve/CVE-2024-26875/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-35790 page", "url": "https://www.suse.com/security/cve/CVE-2024-35790/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-35839 page", "url": "https://www.suse.com/security/cve/CVE-2024-35839/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-36959 page", "url": "https://www.suse.com/security/cve/CVE-2024-36959/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-38588 page", "url": "https://www.suse.com/security/cve/CVE-2024-38588/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-57982 page", "url": "https://www.suse.com/security/cve/CVE-2024-57982/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-21898 page", "url": "https://www.suse.com/security/cve/CVE-2025-21898/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-21920 page", "url": "https://www.suse.com/security/cve/CVE-2025-21920/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-21971 page", "url": "https://www.suse.com/security/cve/CVE-2025-21971/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-22035 page", "url": "https://www.suse.com/security/cve/CVE-2025-22035/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-23149 page", "url": "https://www.suse.com/security/cve/CVE-2025-23149/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-37756 page", "url": "https://www.suse.com/security/cve/CVE-2025-37756/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-37757 page", "url": "https://www.suse.com/security/cve/CVE-2025-37757/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-37781 page", "url": "https://www.suse.com/security/cve/CVE-2025-37781/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-37800 page", "url": "https://www.suse.com/security/cve/CVE-2025-37800/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-37810 page", "url": "https://www.suse.com/security/cve/CVE-2025-37810/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-37836 page", "url": "https://www.suse.com/security/cve/CVE-2025-37836/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-37844 page", "url": "https://www.suse.com/security/cve/CVE-2025-37844/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-37862 page", "url": "https://www.suse.com/security/cve/CVE-2025-37862/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-37892 page", "url": "https://www.suse.com/security/cve/CVE-2025-37892/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-37911 page", "url": "https://www.suse.com/security/cve/CVE-2025-37911/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-37923 page", "url": "https://www.suse.com/security/cve/CVE-2025-37923/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-37927 page", "url": "https://www.suse.com/security/cve/CVE-2025-37927/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-37928 page", "url": "https://www.suse.com/security/cve/CVE-2025-37928/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-37961 page", "url": "https://www.suse.com/security/cve/CVE-2025-37961/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-37980 page", "url": "https://www.suse.com/security/cve/CVE-2025-37980/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-37982 page", "url": "https://www.suse.com/security/cve/CVE-2025-37982/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-37992 page", "url": "https://www.suse.com/security/cve/CVE-2025-37992/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-37995 page", "url": "https://www.suse.com/security/cve/CVE-2025-37995/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-37998 page", "url": "https://www.suse.com/security/cve/CVE-2025-37998/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-38000 page", "url": "https://www.suse.com/security/cve/CVE-2025-38000/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-38004 page", "url": "https://www.suse.com/security/cve/CVE-2025-38004/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-38023 page", "url": "https://www.suse.com/security/cve/CVE-2025-38023/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-38024 page", "url": "https://www.suse.com/security/cve/CVE-2025-38024/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-38061 page", "url": "https://www.suse.com/security/cve/CVE-2025-38061/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-38072 page", "url": "https://www.suse.com/security/cve/CVE-2025-38072/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-38078 page", "url": "https://www.suse.com/security/cve/CVE-2025-38078/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-38083 page", "url": "https://www.suse.com/security/cve/CVE-2025-38083/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2025-07-16T13:46:06Z", "generator": { "date": "2025-07-16T13:46:06Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2025:02334-1", "initial_release_date": "2025-07-16T13:46:06Z", "revision_history": [ { "date": "2025-07-16T13:46:06Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "product": { "name": "cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "product_id": "cluster-md-kmp-default-4.12.14-122.266.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-122.266.1.aarch64", "product": { "name": "dlm-kmp-default-4.12.14-122.266.1.aarch64", "product_id": "dlm-kmp-default-4.12.14-122.266.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-122.266.1.aarch64", "product": { "name": "gfs2-kmp-default-4.12.14-122.266.1.aarch64", "product_id": "gfs2-kmp-default-4.12.14-122.266.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-122.266.1.aarch64", "product": { "name": "kernel-default-4.12.14-122.266.1.aarch64", "product_id": "kernel-default-4.12.14-122.266.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-122.266.1.aarch64", "product": { "name": "kernel-default-base-4.12.14-122.266.1.aarch64", "product_id": "kernel-default-base-4.12.14-122.266.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-122.266.1.aarch64", "product": { "name": "kernel-default-devel-4.12.14-122.266.1.aarch64", "product_id": "kernel-default-devel-4.12.14-122.266.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-122.266.1.aarch64", "product": { "name": "kernel-default-extra-4.12.14-122.266.1.aarch64", "product_id": "kernel-default-extra-4.12.14-122.266.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-122.266.1.aarch64", "product": { "name": "kernel-default-kgraft-4.12.14-122.266.1.aarch64", "product_id": "kernel-default-kgraft-4.12.14-122.266.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-122.266.1.aarch64", "product": { "name": "kernel-obs-build-4.12.14-122.266.1.aarch64", "product_id": "kernel-obs-build-4.12.14-122.266.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-122.266.1.aarch64", "product": { "name": "kernel-obs-qa-4.12.14-122.266.1.aarch64", "product_id": "kernel-obs-qa-4.12.14-122.266.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-122.266.1.aarch64", "product": { "name": "kernel-syms-4.12.14-122.266.1.aarch64", "product_id": "kernel-syms-4.12.14-122.266.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-122.266.1.aarch64", "product": { "name": "kernel-vanilla-4.12.14-122.266.1.aarch64", "product_id": "kernel-vanilla-4.12.14-122.266.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-122.266.1.aarch64", "product": { "name": "kernel-vanilla-base-4.12.14-122.266.1.aarch64", "product_id": "kernel-vanilla-base-4.12.14-122.266.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-122.266.1.aarch64", "product": { "name": "kernel-vanilla-devel-4.12.14-122.266.1.aarch64", "product_id": "kernel-vanilla-devel-4.12.14-122.266.1.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-122.266.1.aarch64", "product": { "name": "kselftests-kmp-default-4.12.14-122.266.1.aarch64", "product_id": "kselftests-kmp-default-4.12.14-122.266.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "product": { "name": "ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "product_id": "ocfs2-kmp-default-4.12.14-122.266.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-4.12.14-122.266.1.noarch", "product": { "name": "kernel-devel-4.12.14-122.266.1.noarch", "product_id": "kernel-devel-4.12.14-122.266.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.12.14-122.266.1.noarch", "product": { "name": "kernel-docs-4.12.14-122.266.1.noarch", "product_id": "kernel-docs-4.12.14-122.266.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-4.12.14-122.266.1.noarch", "product": { "name": "kernel-docs-html-4.12.14-122.266.1.noarch", "product_id": "kernel-docs-html-4.12.14-122.266.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.12.14-122.266.1.noarch", "product": { "name": "kernel-macros-4.12.14-122.266.1.noarch", "product_id": "kernel-macros-4.12.14-122.266.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.12.14-122.266.1.noarch", "product": { "name": "kernel-source-4.12.14-122.266.1.noarch", "product_id": "kernel-source-4.12.14-122.266.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.12.14-122.266.1.noarch", "product": { "name": "kernel-source-vanilla-4.12.14-122.266.1.noarch", "product_id": "kernel-source-vanilla-4.12.14-122.266.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "product": { "name": "cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "product_id": "cluster-md-kmp-default-4.12.14-122.266.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-122.266.1.ppc64le", "product": { "name": "dlm-kmp-default-4.12.14-122.266.1.ppc64le", "product_id": "dlm-kmp-default-4.12.14-122.266.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "product": { "name": "gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "product_id": "gfs2-kmp-default-4.12.14-122.266.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-4.12.14-122.266.1.ppc64le", "product": { "name": "kernel-default-4.12.14-122.266.1.ppc64le", "product_id": "kernel-default-4.12.14-122.266.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-122.266.1.ppc64le", "product": { "name": "kernel-default-base-4.12.14-122.266.1.ppc64le", "product_id": "kernel-default-base-4.12.14-122.266.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-122.266.1.ppc64le", "product": { "name": "kernel-default-devel-4.12.14-122.266.1.ppc64le", "product_id": "kernel-default-devel-4.12.14-122.266.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-122.266.1.ppc64le", "product": { "name": "kernel-default-extra-4.12.14-122.266.1.ppc64le", "product_id": "kernel-default-extra-4.12.14-122.266.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "product": { "name": "kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "product_id": "kernel-default-kgraft-4.12.14-122.266.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "product": { "name": "kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "product_id": "kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-122.266.1.ppc64le", "product": { "name": "kernel-obs-build-4.12.14-122.266.1.ppc64le", "product_id": "kernel-obs-build-4.12.14-122.266.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-122.266.1.ppc64le", "product": { "name": "kernel-obs-qa-4.12.14-122.266.1.ppc64le", "product_id": "kernel-obs-qa-4.12.14-122.266.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-122.266.1.ppc64le", "product": { "name": "kernel-syms-4.12.14-122.266.1.ppc64le", "product_id": "kernel-syms-4.12.14-122.266.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-122.266.1.ppc64le", "product": { "name": "kernel-vanilla-4.12.14-122.266.1.ppc64le", "product_id": "kernel-vanilla-4.12.14-122.266.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-122.266.1.ppc64le", "product": { "name": "kernel-vanilla-base-4.12.14-122.266.1.ppc64le", "product_id": "kernel-vanilla-base-4.12.14-122.266.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-122.266.1.ppc64le", "product": { "name": "kernel-vanilla-devel-4.12.14-122.266.1.ppc64le", "product_id": "kernel-vanilla-devel-4.12.14-122.266.1.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "product": { "name": "kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "product_id": "kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-122.266.1.ppc64le", "product": { "name": "kselftests-kmp-default-4.12.14-122.266.1.ppc64le", "product_id": "kselftests-kmp-default-4.12.14-122.266.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "product": { "name": "ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "product_id": "ocfs2-kmp-default-4.12.14-122.266.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-122.266.1.s390x", "product": { "name": "cluster-md-kmp-default-4.12.14-122.266.1.s390x", "product_id": "cluster-md-kmp-default-4.12.14-122.266.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-122.266.1.s390x", "product": { "name": "dlm-kmp-default-4.12.14-122.266.1.s390x", "product_id": "dlm-kmp-default-4.12.14-122.266.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-122.266.1.s390x", "product": { "name": "gfs2-kmp-default-4.12.14-122.266.1.s390x", "product_id": "gfs2-kmp-default-4.12.14-122.266.1.s390x" } }, { "category": "product_version", "name": "kernel-default-4.12.14-122.266.1.s390x", "product": { "name": "kernel-default-4.12.14-122.266.1.s390x", "product_id": "kernel-default-4.12.14-122.266.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-122.266.1.s390x", "product": { "name": "kernel-default-base-4.12.14-122.266.1.s390x", "product_id": "kernel-default-base-4.12.14-122.266.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-122.266.1.s390x", "product": { "name": "kernel-default-devel-4.12.14-122.266.1.s390x", "product_id": "kernel-default-devel-4.12.14-122.266.1.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-122.266.1.s390x", "product": { "name": "kernel-default-extra-4.12.14-122.266.1.s390x", "product_id": "kernel-default-extra-4.12.14-122.266.1.s390x" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-122.266.1.s390x", "product": { "name": "kernel-default-kgraft-4.12.14-122.266.1.s390x", "product_id": "kernel-default-kgraft-4.12.14-122.266.1.s390x" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "product": { "name": "kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "product_id": "kernel-default-kgraft-devel-4.12.14-122.266.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-4.12.14-122.266.1.s390x", "product": { "name": "kernel-default-man-4.12.14-122.266.1.s390x", "product_id": "kernel-default-man-4.12.14-122.266.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-122.266.1.s390x", "product": { "name": "kernel-obs-build-4.12.14-122.266.1.s390x", "product_id": "kernel-obs-build-4.12.14-122.266.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-122.266.1.s390x", "product": { "name": "kernel-obs-qa-4.12.14-122.266.1.s390x", "product_id": "kernel-obs-qa-4.12.14-122.266.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-122.266.1.s390x", "product": { "name": "kernel-syms-4.12.14-122.266.1.s390x", "product_id": "kernel-syms-4.12.14-122.266.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-122.266.1.s390x", "product": { "name": "kernel-vanilla-4.12.14-122.266.1.s390x", "product_id": "kernel-vanilla-4.12.14-122.266.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-122.266.1.s390x", "product": { "name": "kernel-vanilla-base-4.12.14-122.266.1.s390x", "product_id": "kernel-vanilla-base-4.12.14-122.266.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-122.266.1.s390x", "product": { "name": "kernel-vanilla-devel-4.12.14-122.266.1.s390x", "product_id": "kernel-vanilla-devel-4.12.14-122.266.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-4.12.14-122.266.1.s390x", "product": { "name": "kernel-zfcpdump-4.12.14-122.266.1.s390x", "product_id": "kernel-zfcpdump-4.12.14-122.266.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-man-4.12.14-122.266.1.s390x", "product": { "name": "kernel-zfcpdump-man-4.12.14-122.266.1.s390x", "product_id": "kernel-zfcpdump-man-4.12.14-122.266.1.s390x" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "product": { "name": "kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "product_id": "kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-122.266.1.s390x", "product": { "name": "kselftests-kmp-default-4.12.14-122.266.1.s390x", "product_id": "kselftests-kmp-default-4.12.14-122.266.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-122.266.1.s390x", "product": { "name": "ocfs2-kmp-default-4.12.14-122.266.1.s390x", "product_id": "ocfs2-kmp-default-4.12.14-122.266.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "product": { "name": "cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "product_id": "cluster-md-kmp-default-4.12.14-122.266.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-122.266.1.x86_64", "product": { "name": "dlm-kmp-default-4.12.14-122.266.1.x86_64", "product_id": "dlm-kmp-default-4.12.14-122.266.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-122.266.1.x86_64", "product": { "name": "gfs2-kmp-default-4.12.14-122.266.1.x86_64", "product_id": "gfs2-kmp-default-4.12.14-122.266.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-122.266.1.x86_64", "product": { "name": "kernel-default-4.12.14-122.266.1.x86_64", "product_id": "kernel-default-4.12.14-122.266.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-122.266.1.x86_64", "product": { "name": "kernel-default-base-4.12.14-122.266.1.x86_64", "product_id": "kernel-default-base-4.12.14-122.266.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-122.266.1.x86_64", "product": { "name": "kernel-default-devel-4.12.14-122.266.1.x86_64", "product_id": "kernel-default-devel-4.12.14-122.266.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-122.266.1.x86_64", "product": { "name": "kernel-default-extra-4.12.14-122.266.1.x86_64", "product_id": "kernel-default-extra-4.12.14-122.266.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-122.266.1.x86_64", "product": { "name": "kernel-default-kgraft-4.12.14-122.266.1.x86_64", "product_id": "kernel-default-kgraft-4.12.14-122.266.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "product": { "name": "kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "product_id": "kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-4.12.14-122.266.1.x86_64", "product": { "name": "kernel-kvmsmall-4.12.14-122.266.1.x86_64", "product_id": "kernel-kvmsmall-4.12.14-122.266.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-base-4.12.14-122.266.1.x86_64", "product": { "name": "kernel-kvmsmall-base-4.12.14-122.266.1.x86_64", "product_id": "kernel-kvmsmall-base-4.12.14-122.266.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-4.12.14-122.266.1.x86_64", "product": { "name": "kernel-kvmsmall-devel-4.12.14-122.266.1.x86_64", "product_id": "kernel-kvmsmall-devel-4.12.14-122.266.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-122.266.1.x86_64", "product": { "name": "kernel-obs-build-4.12.14-122.266.1.x86_64", "product_id": "kernel-obs-build-4.12.14-122.266.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-122.266.1.x86_64", "product": { "name": "kernel-obs-qa-4.12.14-122.266.1.x86_64", "product_id": "kernel-obs-qa-4.12.14-122.266.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-122.266.1.x86_64", "product": { "name": "kernel-syms-4.12.14-122.266.1.x86_64", "product_id": "kernel-syms-4.12.14-122.266.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-122.266.1.x86_64", "product": { "name": "kernel-vanilla-4.12.14-122.266.1.x86_64", "product_id": "kernel-vanilla-4.12.14-122.266.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-122.266.1.x86_64", "product": { "name": "kernel-vanilla-base-4.12.14-122.266.1.x86_64", "product_id": "kernel-vanilla-base-4.12.14-122.266.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-122.266.1.x86_64", "product": { "name": "kernel-vanilla-devel-4.12.14-122.266.1.x86_64", "product_id": "kernel-vanilla-devel-4.12.14-122.266.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "product": { "name": "kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "product_id": "kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-122.266.1.x86_64", "product": { "name": "kselftests-kmp-default-4.12.14-122.266.1.x86_64", "product_id": "kselftests-kmp-default-4.12.14-122.266.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "product": { "name": "ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "product_id": "ocfs2-kmp-default-4.12.14-122.266.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP5-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", "product": { "name": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss-extended-security:12:sp5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.12.14-122.266.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le" }, "product_reference": "kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.12.14-122.266.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x" }, "product_reference": "kernel-default-kgraft-4.12.14-122.266.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.12.14-122.266.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64" }, "product_reference": "kernel-default-kgraft-4.12.14-122.266.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le" }, "product_reference": "kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-devel-4.12.14-122.266.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x" }, "product_reference": "kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64" }, "product_reference": "kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-122.266.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64" }, "product_reference": "cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-122.266.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le" }, "product_reference": "cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-122.266.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x" }, "product_reference": "cluster-md-kmp-default-4.12.14-122.266.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-122.266.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64" }, "product_reference": "cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-122.266.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64" }, "product_reference": "dlm-kmp-default-4.12.14-122.266.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-122.266.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le" }, "product_reference": "dlm-kmp-default-4.12.14-122.266.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-122.266.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x" }, "product_reference": "dlm-kmp-default-4.12.14-122.266.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-122.266.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64" }, "product_reference": "dlm-kmp-default-4.12.14-122.266.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-122.266.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64" }, "product_reference": "gfs2-kmp-default-4.12.14-122.266.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-122.266.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le" }, "product_reference": "gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-122.266.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x" }, "product_reference": "gfs2-kmp-default-4.12.14-122.266.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-122.266.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64" }, "product_reference": "gfs2-kmp-default-4.12.14-122.266.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.266.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64" }, "product_reference": "kernel-default-4.12.14-122.266.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.266.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le" }, "product_reference": "kernel-default-4.12.14-122.266.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.266.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x" }, "product_reference": "kernel-default-4.12.14-122.266.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.266.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64" }, "product_reference": "kernel-default-4.12.14-122.266.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.266.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-122.266.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.266.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le" }, "product_reference": "kernel-default-base-4.12.14-122.266.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.266.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x" }, "product_reference": "kernel-default-base-4.12.14-122.266.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.266.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-122.266.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.266.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-122.266.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.266.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-122.266.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.266.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x" }, "product_reference": "kernel-default-devel-4.12.14-122.266.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.266.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-122.266.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.12.14-122.266.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x" }, "product_reference": "kernel-default-man-4.12.14-122.266.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-122.266.1.noarch as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch" }, "product_reference": "kernel-devel-4.12.14-122.266.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-122.266.1.noarch as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch" }, "product_reference": "kernel-macros-4.12.14-122.266.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-122.266.1.noarch as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch" }, "product_reference": "kernel-source-4.12.14-122.266.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.266.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-122.266.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.266.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-122.266.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.266.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x" }, "product_reference": "kernel-syms-4.12.14-122.266.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.266.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-122.266.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-122.266.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64" }, "product_reference": "ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-122.266.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le" }, "product_reference": "ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-122.266.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x" }, "product_reference": "ocfs2-kmp-default-4.12.14-122.266.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-122.266.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" }, "product_reference": "ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-122.266.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64" }, "product_reference": "cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-122.266.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64" }, "product_reference": "dlm-kmp-default-4.12.14-122.266.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-122.266.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64" }, "product_reference": "gfs2-kmp-default-4.12.14-122.266.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.266.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64" }, "product_reference": "kernel-default-4.12.14-122.266.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.266.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-122.266.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.266.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-122.266.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-122.266.1.noarch as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch" }, "product_reference": "kernel-devel-4.12.14-122.266.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-122.266.1.noarch as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch" }, "product_reference": "kernel-macros-4.12.14-122.266.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-122.266.1.noarch as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch" }, "product_reference": "kernel-source-4.12.14-122.266.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.266.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-122.266.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-122.266.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" }, "product_reference": "ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-43527", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-43527" } ], "notes": [ { "category": "general", "text": "NSS (Network Security Services) versions prior to 3.73 or 3.68.1 ESR are vulnerable to a heap overflow when handling DER-encoded DSA or RSA-PSS signatures. Applications using NSS for handling signatures encoded within CMS, S/MIME, PKCS \\#7, or PKCS \\#12 are likely to be impacted. Applications using NSS for certificate validation or other TLS, X.509, OCSP or CRL functionality may be impacted, depending on how they configure NSS. *Note: This vulnerability does NOT impact Mozilla Firefox.* However, email clients and PDF viewers that use NSS for signature verification, such as Thunderbird, LibreOffice, Evolution and Evince are believed to be impacted. This vulnerability affects NSS \u003c 3.73 and NSS \u003c 3.68.1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-43527", "url": "https://www.suse.com/security/cve/CVE-2021-43527" }, { "category": "external", "summary": "SUSE Bug 1193170 for CVE-2021-43527", "url": "https://bugzilla.suse.com/1193170" }, { "category": "external", "summary": "SUSE Bug 1193331 for CVE-2021-43527", "url": "https://bugzilla.suse.com/1193331" }, { "category": "external", "summary": "SUSE Bug 1193378 for CVE-2021-43527", "url": "https://bugzilla.suse.com/1193378" }, { "category": "external", "summary": "SUSE Bug 1194288 for CVE-2021-43527", "url": "https://bugzilla.suse.com/1194288" }, { "category": "external", "summary": "SUSE Bug 1199301 for CVE-2021-43527", "url": "https://bugzilla.suse.com/1199301" }, { "category": "external", "summary": "SUSE Bug 1225630 for CVE-2021-43527", "url": "https://bugzilla.suse.com/1225630" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "important" } ], "title": "CVE-2021-43527" }, { "cve": "CVE-2021-47212", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-47212" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5: Update error handler for UCTX and UMEM\n\nIn the fast unload flow, the device state is set to internal error,\nwhich indicates that the driver started the destroy process.\nIn this case, when a destroy command is being executed, it should return\nMLX5_CMD_STAT_OK.\nFix MLX5_CMD_OP_DESTROY_UCTX and MLX5_CMD_OP_DESTROY_UMEM to return OK\ninstead of EIO.\n\nThis fixes a call trace in the umem release process -\n[ 2633.536695] Call Trace:\n[ 2633.537518] ib_uverbs_remove_one+0xc3/0x140 [ib_uverbs]\n[ 2633.538596] remove_client_context+0x8b/0xd0 [ib_core]\n[ 2633.539641] disable_device+0x8c/0x130 [ib_core]\n[ 2633.540615] __ib_unregister_device+0x35/0xa0 [ib_core]\n[ 2633.541640] ib_unregister_device+0x21/0x30 [ib_core]\n[ 2633.542663] __mlx5_ib_remove+0x38/0x90 [mlx5_ib]\n[ 2633.543640] auxiliary_bus_remove+0x1e/0x30 [auxiliary]\n[ 2633.544661] device_release_driver_internal+0x103/0x1f0\n[ 2633.545679] bus_remove_device+0xf7/0x170\n[ 2633.546640] device_del+0x181/0x410\n[ 2633.547606] mlx5_rescan_drivers_locked.part.10+0x63/0x160 [mlx5_core]\n[ 2633.548777] mlx5_unregister_device+0x27/0x40 [mlx5_core]\n[ 2633.549841] mlx5_uninit_one+0x21/0xc0 [mlx5_core]\n[ 2633.550864] remove_one+0x69/0xe0 [mlx5_core]\n[ 2633.551819] pci_device_remove+0x3b/0xc0\n[ 2633.552731] device_release_driver_internal+0x103/0x1f0\n[ 2633.553746] unbind_store+0xf6/0x130\n[ 2633.554657] kernfs_fop_write+0x116/0x190\n[ 2633.555567] vfs_write+0xa5/0x1a0\n[ 2633.556407] ksys_write+0x4f/0xb0\n[ 2633.557233] do_syscall_64+0x5b/0x1a0\n[ 2633.558071] entry_SYSCALL_64_after_hwframe+0x65/0xca\n[ 2633.559018] RIP: 0033:0x7f9977132648\n[ 2633.559821] Code: 89 02 48 c7 c0 ff ff ff ff eb b3 0f 1f 80 00 00 00 00 f3 0f 1e fa 48 8d 05 55 6f 2d 00 8b 00 85 c0 75 17 b8 01 00 00 00 0f 05 \u003c48\u003e 3d 00 f0 ff ff 77 58 c3 0f 1f 80 00 00 00 00 41 54 49 89 d4 55\n[ 2633.562332] RSP: 002b:00007fffb1a83888 EFLAGS: 00000246 ORIG_RAX: 0000000000000001\n[ 2633.563472] RAX: ffffffffffffffda RBX: 000000000000000c RCX: 00007f9977132648\n[ 2633.564541] RDX: 000000000000000c RSI: 000055b90546e230 RDI: 0000000000000001\n[ 2633.565596] RBP: 000055b90546e230 R08: 00007f9977406860 R09: 00007f9977a54740\n[ 2633.566653] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f99774056e0\n[ 2633.567692] R13: 000000000000000c R14: 00007f9977400880 R15: 000000000000000c\n[ 2633.568725] ---[ end trace 10b4fe52945e544d ]---", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-47212", "url": "https://www.suse.com/security/cve/CVE-2021-47212" }, { "category": "external", "summary": "SUSE Bug 1222709 for CVE-2021-47212", "url": "https://bugzilla.suse.com/1222709" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2021-47212" }, { "cve": "CVE-2021-47455", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-47455" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nptp: Fix possible memory leak in ptp_clock_register()\n\nI got memory leak as follows when doing fault injection test:\n\nunreferenced object 0xffff88800906c618 (size 8):\n comm \"i2c-idt82p33931\", pid 4421, jiffies 4294948083 (age 13.188s)\n hex dump (first 8 bytes):\n 70 74 70 30 00 00 00 00 ptp0....\n backtrace:\n [\u003c00000000312ed458\u003e] __kmalloc_track_caller+0x19f/0x3a0\n [\u003c0000000079f6e2ff\u003e] kvasprintf+0xb5/0x150\n [\u003c0000000026aae54f\u003e] kvasprintf_const+0x60/0x190\n [\u003c00000000f323a5f7\u003e] kobject_set_name_vargs+0x56/0x150\n [\u003c000000004e35abdd\u003e] dev_set_name+0xc0/0x100\n [\u003c00000000f20cfe25\u003e] ptp_clock_register+0x9f4/0xd30 [ptp]\n [\u003c000000008bb9f0de\u003e] idt82p33_probe.cold+0x8b6/0x1561 [ptp_idt82p33]\n\nWhen posix_clock_register() returns an error, the name allocated\nin dev_set_name() will be leaked, the put_device() should be used\nto give up the device reference, then the name will be freed in\nkobject_cleanup() and other memory will be freed in ptp_clock_release().", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-47455", "url": "https://www.suse.com/security/cve/CVE-2021-47455" }, { "category": "external", "summary": "SUSE Bug 1225254 for CVE-2021-47455", "url": "https://bugzilla.suse.com/1225254" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2021-47455" }, { "cve": "CVE-2022-1679", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1679" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in the Linux kernel\u0027s Atheros wireless adapter driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages. This flaw allows a local user to crash or potentially escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1679", "url": "https://www.suse.com/security/cve/CVE-2022-1679" }, { "category": "external", "summary": "SUSE Bug 1199487 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1199487" }, { "category": "external", "summary": "SUSE Bug 1201080 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1201080" }, { "category": "external", "summary": "SUSE Bug 1201832 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1201832" }, { "category": "external", "summary": "SUSE Bug 1204132 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1204132" }, { "category": "external", "summary": "SUSE Bug 1212316 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1212316" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "important" } ], "title": "CVE-2022-1679" }, { "cve": "CVE-2022-21546", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21546" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: target: Fix WRITE_SAME No Data Buffer crash\n\nIn newer version of the SBC specs, we have a NDOB bit that indicates there\nis no data buffer that gets written out. If this bit is set using commands\nlike \"sg_write_same --ndob\" we will crash in target_core_iblock/file\u0027s\nexecute_write_same handlers when we go to access the se_cmd-\u003et_data_sg\nbecause its NULL.\n\nThis patch adds a check for the NDOB bit in the common WRITE SAME code\nbecause we don\u0027t support it. And, it adds a check for zero SG elements in\neach handler in case the initiator tries to send a normal WRITE SAME with\nno data buffer.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21546", "url": "https://www.suse.com/security/cve/CVE-2022-21546" }, { "category": "external", "summary": "SUSE Bug 1242243 for CVE-2022-21546", "url": "https://bugzilla.suse.com/1242243" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2022-21546" }, { "cve": "CVE-2022-2586", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-2586" } ], "notes": [ { "category": "general", "text": "It was discovered that a nft object or expression could reference a nft set on a different nft table, leading to a use-after-free once that table was deleted.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-2586", "url": "https://www.suse.com/security/cve/CVE-2022-2586" }, { "category": "external", "summary": "SUSE Bug 1202095 for CVE-2022-2586", "url": "https://bugzilla.suse.com/1202095" }, { "category": "external", "summary": "SUSE Bug 1209719 for CVE-2022-2586", "url": "https://bugzilla.suse.com/1209719" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2022-2586" }, { "cve": "CVE-2022-3903", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-3903" } ], "notes": [ { "category": "general", "text": "An incorrect read request flaw was found in the Infrared Transceiver USB driver in the Linux kernel. This issue occurs when a user attaches a malicious USB device. A local user could use this flaw to starve the resources, causing denial of service or potentially crashing the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-3903", "url": "https://www.suse.com/security/cve/CVE-2022-3903" }, { "category": "external", "summary": "SUSE Bug 1205220 for CVE-2022-3903", "url": "https://bugzilla.suse.com/1205220" }, { "category": "external", "summary": "SUSE Bug 1212297 for CVE-2022-3903", "url": "https://bugzilla.suse.com/1212297" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2022-3903" }, { "cve": "CVE-2022-4095", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-4095" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in Linux kernel before 5.19.2. This issue occurs in cmd_hdl_filter in drivers/staging/rtl8712/rtl8712_cmd.c, allowing an attacker to launch a local denial of service attack and gain escalation of privileges.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-4095", "url": "https://www.suse.com/security/cve/CVE-2022-4095" }, { "category": "external", "summary": "SUSE Bug 1205514 for CVE-2022-4095", "url": "https://bugzilla.suse.com/1205514" }, { "category": "external", "summary": "SUSE Bug 1205594 for CVE-2022-4095", "url": "https://bugzilla.suse.com/1205594" }, { "category": "external", "summary": "SUSE Bug 1208030 for CVE-2022-4095", "url": "https://bugzilla.suse.com/1208030" }, { "category": "external", "summary": "SUSE Bug 1208085 for CVE-2022-4095", "url": "https://bugzilla.suse.com/1208085" }, { "category": "external", "summary": "SUSE Bug 1212319 for CVE-2022-4095", "url": "https://bugzilla.suse.com/1212319" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "important" } ], "title": "CVE-2022-4095" }, { "cve": "CVE-2022-4662", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-4662" } ], "notes": [ { "category": "general", "text": "A flaw incorrect access control in the Linux kernel USB core subsystem was found in the way user attaches usb device. A local user could use this flaw to crash the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-4662", "url": "https://www.suse.com/security/cve/CVE-2022-4662" }, { "category": "external", "summary": "SUSE Bug 1206664 for CVE-2022-4662", "url": "https://bugzilla.suse.com/1206664" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2022-4662" }, { "cve": "CVE-2022-49154", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-49154" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: SVM: fix panic on out-of-bounds guest IRQ\n\nAs guest_irq is coming from KVM_IRQFD API call, it may trigger\ncrash in svm_update_pi_irte() due to out-of-bounds:\n\ncrash\u003e bt\nPID: 22218 TASK: ffff951a6ad74980 CPU: 73 COMMAND: \"vcpu8\"\n #0 [ffffb1ba6707fa40] machine_kexec at ffffffff8565b397\n #1 [ffffb1ba6707fa90] __crash_kexec at ffffffff85788a6d\n #2 [ffffb1ba6707fb58] crash_kexec at ffffffff8578995d\n #3 [ffffb1ba6707fb70] oops_end at ffffffff85623c0d\n #4 [ffffb1ba6707fb90] no_context at ffffffff856692c9\n #5 [ffffb1ba6707fbf8] exc_page_fault at ffffffff85f95b51\n #6 [ffffb1ba6707fc50] asm_exc_page_fault at ffffffff86000ace\n [exception RIP: svm_update_pi_irte+227]\n RIP: ffffffffc0761b53 RSP: ffffb1ba6707fd08 RFLAGS: 00010086\n RAX: ffffb1ba6707fd78 RBX: ffffb1ba66d91000 RCX: 0000000000000001\n RDX: 00003c803f63f1c0 RSI: 000000000000019a RDI: ffffb1ba66db2ab8\n RBP: 000000000000019a R8: 0000000000000040 R9: ffff94ca41b82200\n R10: ffffffffffffffcf R11: 0000000000000001 R12: 0000000000000001\n R13: 0000000000000001 R14: ffffffffffffffcf R15: 000000000000005f\n ORIG_RAX: ffffffffffffffff CS: 0010 SS: 0018\n #7 [ffffb1ba6707fdb8] kvm_irq_routing_update at ffffffffc09f19a1 [kvm]\n #8 [ffffb1ba6707fde0] kvm_set_irq_routing at ffffffffc09f2133 [kvm]\n #9 [ffffb1ba6707fe18] kvm_vm_ioctl at ffffffffc09ef544 [kvm]\n RIP: 00007f143c36488b RSP: 00007f143a4e04b8 RFLAGS: 00000246\n RAX: ffffffffffffffda RBX: 00007f05780041d0 RCX: 00007f143c36488b\n RDX: 00007f05780041d0 RSI: 000000004008ae6a RDI: 0000000000000020\n RBP: 00000000000004e8 R8: 0000000000000008 R9: 00007f05780041e0\n R10: 00007f0578004560 R11: 0000000000000246 R12: 00000000000004e0\n R13: 000000000000001a R14: 00007f1424001c60 R15: 00007f0578003bc0\n ORIG_RAX: 0000000000000010 CS: 0033 SS: 002b\n\nVmx have been fix this in commit 3a8b0677fc61 (KVM: VMX: Do not BUG() on\nout-of-bounds guest IRQ), so we can just copy source from that to fix\nthis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-49154", "url": "https://www.suse.com/security/cve/CVE-2022-49154" }, { "category": "external", "summary": "SUSE Bug 1238167 for CVE-2022-49154", "url": "https://bugzilla.suse.com/1238167" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2022-49154" }, { "cve": "CVE-2022-49622", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-49622" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: avoid skb access on nf_stolen\n\nWhen verdict is NF_STOLEN, the skb might have been freed.\n\nWhen tracing is enabled, this can result in a use-after-free:\n1. access to skb-\u003enf_trace\n2. access to skb-\u003emark\n3. computation of trace id\n4. dump of packet payload\n\nTo avoid 1, keep a cached copy of skb-\u003enf_trace in the\ntrace state struct.\nRefresh this copy whenever verdict is != STOLEN.\n\nAvoid 2 by skipping skb-\u003emark access if verdict is STOLEN.\n\n3 is avoided by precomputing the trace id.\n\nOnly dump the packet when verdict is not \"STOLEN\".", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-49622", "url": "https://www.suse.com/security/cve/CVE-2022-49622" }, { "category": "external", "summary": "SUSE Bug 1239042 for CVE-2022-49622", "url": "https://bugzilla.suse.com/1239042" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2022-49622" }, { "cve": "CVE-2022-49731", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-49731" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nata: libata-core: fix NULL pointer deref in ata_host_alloc_pinfo()\n\nIn an unlikely (and probably wrong?) case that the \u0027ppi\u0027 parameter of\nata_host_alloc_pinfo() points to an array starting with a NULL pointer,\nthere\u0027s going to be a kernel oops as the \u0027pi\u0027 local variable won\u0027t get\nreassigned from the initial value of NULL. Initialize \u0027pi\u0027 instead to\n\u0027\u0026ata_dummy_port_info\u0027 to fix the possible kernel oops for good...\n\nFound by Linux Verification Center (linuxtesting.org) with the SVACE static\nanalysis tool.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-49731", "url": "https://www.suse.com/security/cve/CVE-2022-49731" }, { "category": "external", "summary": "SUSE Bug 1239071 for CVE-2022-49731", "url": "https://bugzilla.suse.com/1239071" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2022-49731" }, { "cve": "CVE-2022-49764", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-49764" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Prevent bpf program recursion for raw tracepoint probes\n\nWe got report from sysbot [1] about warnings that were caused by\nbpf program attached to contention_begin raw tracepoint triggering\nthe same tracepoint by using bpf_trace_printk helper that takes\ntrace_printk_lock lock.\n\n Call Trace:\n \u003cTASK\u003e\n ? trace_event_raw_event_bpf_trace_printk+0x5f/0x90\n bpf_trace_printk+0x2b/0xe0\n bpf_prog_a9aec6167c091eef_prog+0x1f/0x24\n bpf_trace_run2+0x26/0x90\n native_queued_spin_lock_slowpath+0x1c6/0x2b0\n _raw_spin_lock_irqsave+0x44/0x50\n bpf_trace_printk+0x3f/0xe0\n bpf_prog_a9aec6167c091eef_prog+0x1f/0x24\n bpf_trace_run2+0x26/0x90\n native_queued_spin_lock_slowpath+0x1c6/0x2b0\n _raw_spin_lock_irqsave+0x44/0x50\n bpf_trace_printk+0x3f/0xe0\n bpf_prog_a9aec6167c091eef_prog+0x1f/0x24\n bpf_trace_run2+0x26/0x90\n native_queued_spin_lock_slowpath+0x1c6/0x2b0\n _raw_spin_lock_irqsave+0x44/0x50\n bpf_trace_printk+0x3f/0xe0\n bpf_prog_a9aec6167c091eef_prog+0x1f/0x24\n bpf_trace_run2+0x26/0x90\n native_queued_spin_lock_slowpath+0x1c6/0x2b0\n _raw_spin_lock_irqsave+0x44/0x50\n __unfreeze_partials+0x5b/0x160\n ...\n\nThe can be reproduced by attaching bpf program as raw tracepoint on\ncontention_begin tracepoint. The bpf prog calls bpf_trace_printk\nhelper. Then by running perf bench the spin lock code is forced to\ntake slow path and call contention_begin tracepoint.\n\nFixing this by skipping execution of the bpf program if it\u0027s\nalready running, Using bpf prog \u0027active\u0027 field, which is being\ncurrently used by trampoline programs for the same reason.\n\nMoving bpf_prog_inc_misses_counter to syscall.c because\ntrampoline.c is compiled in just for CONFIG_BPF_JIT option.\n\n[1] https://lore.kernel.org/bpf/YxhFe3EwqchC%2FfYf@krava/T/#t", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-49764", "url": "https://www.suse.com/security/cve/CVE-2022-49764" }, { "category": "external", "summary": "SUSE Bug 1242301 for CVE-2022-49764", "url": "https://bugzilla.suse.com/1242301" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2022-49764" }, { "cve": "CVE-2022-49780", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-49780" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: target: tcm_loop: Fix possible name leak in tcm_loop_setup_hba_bus()\n\nIf device_register() fails in tcm_loop_setup_hba_bus(), the name allocated\nby dev_set_name() need be freed. As comment of device_register() says, it\nshould use put_device() to give up the reference in the error path. So fix\nthis by calling put_device(), then the name can be freed in kobject_cleanup().\nThe \u0027tl_hba\u0027 will be freed in tcm_loop_release_adapter(), so it don\u0027t need\ngoto error label in this case.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-49780", "url": "https://www.suse.com/security/cve/CVE-2022-49780" }, { "category": "external", "summary": "SUSE Bug 1242262 for CVE-2022-49780", "url": "https://bugzilla.suse.com/1242262" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2022-49780" }, { "cve": "CVE-2022-49814", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-49814" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nkcm: close race conditions on sk_receive_queue\n\nsk-\u003esk_receive_queue is protected by skb queue lock, but for KCM\nsockets its RX path takes mux-\u003erx_lock to protect more than just\nskb queue. However, kcm_recvmsg() still only grabs the skb queue\nlock, so race conditions still exist.\n\nWe can teach kcm_recvmsg() to grab mux-\u003erx_lock too but this would\nintroduce a potential performance regression as struct kcm_mux can\nbe shared by multiple KCM sockets.\n\nSo we have to enforce skb queue lock in requeue_rx_msgs() and handle\nskb peek case carefully in kcm_wait_data(). Fortunately,\nskb_recv_datagram() already handles it nicely and is widely used by\nother sockets, we can just switch to skb_recv_datagram() after\ngetting rid of the unnecessary sock lock in kcm_recvmsg() and\nkcm_splice_read(). Side note: SOCK_DONE is not used by KCM sockets,\nso it is safe to get rid of this check too.\n\nI ran the original syzbot reproducer for 30 min without seeing any\nissue.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-49814", "url": "https://www.suse.com/security/cve/CVE-2022-49814" }, { "category": "external", "summary": "SUSE Bug 1242498 for CVE-2022-49814", "url": "https://bugzilla.suse.com/1242498" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2022-49814" }, { "cve": "CVE-2022-49879", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-49879" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: fix BUG_ON() when directory entry has invalid rec_len\n\nThe rec_len field in the directory entry has to be a multiple of 4. A\ncorrupted filesystem image can be used to hit a BUG() in\next4_rec_len_to_disk(), called from make_indexed_dir().\n\n ------------[ cut here ]------------\n kernel BUG at fs/ext4/ext4.h:2413!\n ...\n RIP: 0010:make_indexed_dir+0x53f/0x5f0\n ...\n Call Trace:\n \u003cTASK\u003e\n ? add_dirent_to_buf+0x1b2/0x200\n ext4_add_entry+0x36e/0x480\n ext4_add_nondir+0x2b/0xc0\n ext4_create+0x163/0x200\n path_openat+0x635/0xe90\n do_filp_open+0xb4/0x160\n ? __create_object.isra.0+0x1de/0x3b0\n ? _raw_spin_unlock+0x12/0x30\n do_sys_openat2+0x91/0x150\n __x64_sys_open+0x6c/0xa0\n do_syscall_64+0x3c/0x80\n entry_SYSCALL_64_after_hwframe+0x46/0xb0\n\nThe fix simply adds a call to ext4_check_dir_entry() to validate the\ndirectory entry, returning -EFSCORRUPTED if the entry is invalid.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-49879", "url": "https://www.suse.com/security/cve/CVE-2022-49879" }, { "category": "external", "summary": "SUSE Bug 1242733 for CVE-2022-49879", "url": "https://bugzilla.suse.com/1242733" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2022-49879" }, { "cve": "CVE-2022-49881", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-49881" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: cfg80211: fix memory leak in query_regdb_file()\n\nIn the function query_regdb_file() the alpha2 parameter is duplicated\nusing kmemdup() and subsequently freed in regdb_fw_cb(). However,\nrequest_firmware_nowait() can fail without calling regdb_fw_cb() and\nthus leak memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-49881", "url": "https://www.suse.com/security/cve/CVE-2022-49881" }, { "category": "external", "summary": "SUSE Bug 1242481 for CVE-2022-49881", "url": "https://bugzilla.suse.com/1242481" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2022-49881" }, { "cve": "CVE-2022-49917", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-49917" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipvs: fix WARNING in ip_vs_app_net_cleanup()\n\nDuring the initialization of ip_vs_app_net_init(), if file ip_vs_app\nfails to be created, the initialization is successful by default.\nTherefore, the ip_vs_app file doesn\u0027t be found during the remove in\nip_vs_app_net_cleanup(). It will cause WRNING.\n\nThe following is the stack information:\nname \u0027ip_vs_app\u0027\nWARNING: CPU: 1 PID: 9 at fs/proc/generic.c:712 remove_proc_entry+0x389/0x460\nModules linked in:\nWorkqueue: netns cleanup_net\nRIP: 0010:remove_proc_entry+0x389/0x460\nCall Trace:\n\u003cTASK\u003e\nops_exit_list+0x125/0x170\ncleanup_net+0x4ea/0xb00\nprocess_one_work+0x9bf/0x1710\nworker_thread+0x665/0x1080\nkthread+0x2e4/0x3a0\nret_from_fork+0x1f/0x30\n\u003c/TASK\u003e", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-49917", "url": "https://www.suse.com/security/cve/CVE-2022-49917" }, { "category": "external", "summary": "SUSE Bug 1242406 for CVE-2022-49917", "url": "https://bugzilla.suse.com/1242406" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2022-49917" }, { "cve": "CVE-2022-49921", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-49921" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: sched: Fix use after free in red_enqueue()\n\nWe can\u0027t use \"skb\" again after passing it to qdisc_enqueue(). This is\nbasically identical to commit 2f09707d0c97 (\"sch_sfb: Also store skb\nlen before calling child enqueue\").", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-49921", "url": "https://www.suse.com/security/cve/CVE-2022-49921" }, { "category": "external", "summary": "SUSE Bug 1242359 for CVE-2022-49921", "url": "https://bugzilla.suse.com/1242359" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2022-49921" }, { "cve": "CVE-2022-49936", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-49936" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nUSB: core: Prevent nested device-reset calls\n\nAutomatic kernel fuzzing revealed a recursive locking violation in\nusb-storage:\n\n============================================\nWARNING: possible recursive locking detected\n5.18.0 #3 Not tainted\n--------------------------------------------\nkworker/1:3/1205 is trying to acquire lock:\nffff888018638db8 (\u0026us_interface_key[i]){+.+.}-{3:3}, at:\nusb_stor_pre_reset+0x35/0x40 drivers/usb/storage/usb.c:230\n\nbut task is already holding lock:\nffff888018638db8 (\u0026us_interface_key[i]){+.+.}-{3:3}, at:\nusb_stor_pre_reset+0x35/0x40 drivers/usb/storage/usb.c:230\n\n...\n\nstack backtrace:\nCPU: 1 PID: 1205 Comm: kworker/1:3 Not tainted 5.18.0 #3\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS\n1.13.0-1ubuntu1.1 04/01/2014\nWorkqueue: usb_hub_wq hub_event\nCall Trace:\n\u003cTASK\u003e\n__dump_stack lib/dump_stack.c:88 [inline]\ndump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106\nprint_deadlock_bug kernel/locking/lockdep.c:2988 [inline]\ncheck_deadlock kernel/locking/lockdep.c:3031 [inline]\nvalidate_chain kernel/locking/lockdep.c:3816 [inline]\n__lock_acquire.cold+0x152/0x3ca kernel/locking/lockdep.c:5053\nlock_acquire kernel/locking/lockdep.c:5665 [inline]\nlock_acquire+0x1ab/0x520 kernel/locking/lockdep.c:5630\n__mutex_lock_common kernel/locking/mutex.c:603 [inline]\n__mutex_lock+0x14f/0x1610 kernel/locking/mutex.c:747\nusb_stor_pre_reset+0x35/0x40 drivers/usb/storage/usb.c:230\nusb_reset_device+0x37d/0x9a0 drivers/usb/core/hub.c:6109\nr871xu_dev_remove+0x21a/0x270 drivers/staging/rtl8712/usb_intf.c:622\nusb_unbind_interface+0x1bd/0x890 drivers/usb/core/driver.c:458\ndevice_remove drivers/base/dd.c:545 [inline]\ndevice_remove+0x11f/0x170 drivers/base/dd.c:537\n__device_release_driver drivers/base/dd.c:1222 [inline]\ndevice_release_driver_internal+0x1a7/0x2f0 drivers/base/dd.c:1248\nusb_driver_release_interface+0x102/0x180 drivers/usb/core/driver.c:627\nusb_forced_unbind_intf+0x4d/0xa0 drivers/usb/core/driver.c:1118\nusb_reset_device+0x39b/0x9a0 drivers/usb/core/hub.c:6114\n\nThis turned out not to be an error in usb-storage but rather a nested\ndevice reset attempt. That is, as the rtl8712 driver was being\nunbound from a composite device in preparation for an unrelated USB\nreset (that driver does not have pre_reset or post_reset callbacks),\nits -\u003eremove routine called usb_reset_device() -- thus nesting one\nreset call within another.\n\nPerforming a reset as part of disconnect processing is a questionable\npractice at best. However, the bug report points out that the USB\ncore does not have any protection against nested resets. Adding a\nreset_in_progress flag and testing it will prevent such errors in the\nfuture.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-49936", "url": "https://www.suse.com/security/cve/CVE-2022-49936" }, { "category": "external", "summary": "SUSE Bug 1244984 for CVE-2022-49936", "url": "https://bugzilla.suse.com/1244984" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2022-49936" }, { "cve": "CVE-2022-49937", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-49937" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: mceusb: Use new usb_control_msg_*() routines\n\nAutomatic kernel fuzzing led to a WARN about invalid pipe direction in\nthe mceusb driver:\n\n------------[ cut here ]------------\nusb 6-1: BOGUS control dir, pipe 80000380 doesn\u0027t match bRequestType 40\nWARNING: CPU: 0 PID: 2465 at drivers/usb/core/urb.c:410\nusb_submit_urb+0x1326/0x1820 drivers/usb/core/urb.c:410\nModules linked in:\nCPU: 0 PID: 2465 Comm: kworker/0:2 Not tainted 5.19.0-rc4-00208-g69cb6c6556ad #1\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS\n1.13.0-1ubuntu1.1 04/01/2014\nWorkqueue: usb_hub_wq hub_event\nRIP: 0010:usb_submit_urb+0x1326/0x1820 drivers/usb/core/urb.c:410\nCode: 7c 24 40 e8 ac 23 91 fd 48 8b 7c 24 40 e8 b2 70 1b ff 45 89 e8\n44 89 f1 4c 89 e2 48 89 c6 48 c7 c7 a0 30 a9 86 e8 48 07 11 02 \u003c0f\u003e 0b\ne9 1c f0 ff ff e8 7e 23 91 fd 0f b6 1d 63 22 83 05 31 ff 41\nRSP: 0018:ffffc900032becf0 EFLAGS: 00010282\nRAX: 0000000000000000 RBX: ffff8881100f3058 RCX: 0000000000000000\nRDX: ffffc90004961000 RSI: ffff888114c6d580 RDI: fffff52000657d90\nRBP: ffff888105ad90f0 R08: ffffffff812c3638 R09: 0000000000000000\nR10: 0000000000000005 R11: ffffed1023504ef1 R12: ffff888105ad9000\nR13: 0000000000000040 R14: 0000000080000380 R15: ffff88810ba96500\nFS: 0000000000000000(0000) GS:ffff88811a800000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007ffe810bda58 CR3: 000000010b720000 CR4: 0000000000350ef0\nCall Trace:\n\u003cTASK\u003e\nusb_start_wait_urb+0x101/0x4c0 drivers/usb/core/message.c:58\nusb_internal_control_msg drivers/usb/core/message.c:102 [inline]\nusb_control_msg+0x31c/0x4a0 drivers/usb/core/message.c:153\nmceusb_gen1_init drivers/media/rc/mceusb.c:1431 [inline]\nmceusb_dev_probe+0x258e/0x33f0 drivers/media/rc/mceusb.c:1807\n\nThe reason for the warning is clear enough; the driver sends an\nunusual read request on endpoint 0 but does not set the USB_DIR_IN bit\nin the bRequestType field.\n\nMore importantly, the whole situation can be avoided and the driver\nsimplified by converting it over to the relatively new\nusb_control_msg_recv() and usb_control_msg_send() routines. That\u0027s\nwhat this fix does.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-49937", "url": "https://www.suse.com/security/cve/CVE-2022-49937" }, { "category": "external", "summary": "SUSE Bug 1245057 for CVE-2022-49937", "url": "https://bugzilla.suse.com/1245057" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2022-49937" }, { "cve": "CVE-2022-49938", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-49938" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncifs: fix small mempool leak in SMB2_negotiate()\n\nIn some cases of failure (dialect mismatches) in SMB2_negotiate(), after\nthe request is sent, the checks would return -EIO when they should be\nrather setting rc = -EIO and jumping to neg_exit to free the response\nbuffer from mempool.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-49938", "url": "https://www.suse.com/security/cve/CVE-2022-49938" }, { "category": "external", "summary": "SUSE Bug 1244820 for CVE-2022-49938", "url": "https://bugzilla.suse.com/1244820" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "low" } ], "title": "CVE-2022-49938" }, { "cve": "CVE-2022-49954", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-49954" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nInput: iforce - wake up after clearing IFORCE_XMIT_RUNNING flag\n\nsyzbot is reporting hung task at __input_unregister_device() [1], for\niforce_close() waiting at wait_event_interruptible() with dev-\u003emutex held\nis blocking input_disconnect_device() from __input_unregister_device().\n\nIt seems that the cause is simply that commit c2b27ef672992a20 (\"Input:\niforce - wait for command completion when closing the device\") forgot to\ncall wake_up() after clear_bit().\n\nFix this problem by introducing a helper that calls clear_bit() followed\nby wake_up_all().", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-49954", "url": "https://www.suse.com/security/cve/CVE-2022-49954" }, { "category": "external", "summary": "SUSE Bug 1244976 for CVE-2022-49954", "url": "https://bugzilla.suse.com/1244976" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2022-49954" }, { "cve": "CVE-2022-49956", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-49956" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nstaging: rtl8712: fix use after free bugs\n\n_Read/Write_MACREG callbacks are NULL so the read/write_macreg_hdl()\nfunctions don\u0027t do anything except free the \"pcmd\" pointer. It\nresults in a use after free. Delete them.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-49956", "url": "https://www.suse.com/security/cve/CVE-2022-49956" }, { "category": "external", "summary": "SUSE Bug 1244969 for CVE-2022-49956", "url": "https://bugzilla.suse.com/1244969" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2022-49956" }, { "cve": "CVE-2022-49957", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-49957" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nkcm: fix strp_init() order and cleanup\n\nstrp_init() is called just a few lines above this csk-\u003esk_user_data\ncheck, it also initializes strp-\u003ework etc., therefore, it is\nunnecessary to call strp_done() to cancel the freshly initialized\nwork.\n\nAnd if sk_user_data is already used by KCM, psock-\u003estrp should not be\ntouched, particularly strp-\u003ework state, so we need to move strp_init()\nafter the csk-\u003esk_user_data check.\n\nThis also makes a lockdep warning reported by syzbot go away.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-49957", "url": "https://www.suse.com/security/cve/CVE-2022-49957" }, { "category": "external", "summary": "SUSE Bug 1244966 for CVE-2022-49957", "url": "https://bugzilla.suse.com/1244966" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2022-49957" }, { "cve": "CVE-2022-49977", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-49977" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nftrace: Fix NULL pointer dereference in is_ftrace_trampoline when ftrace is dead\n\nftrace_startup does not remove ops from ftrace_ops_list when\nftrace_startup_enable fails:\n\nregister_ftrace_function\n ftrace_startup\n __register_ftrace_function\n ...\n add_ftrace_ops(\u0026ftrace_ops_list, ops)\n ...\n ...\n ftrace_startup_enable // if ftrace failed to modify, ftrace_disabled is set to 1\n ...\n return 0 // ops is in the ftrace_ops_list.\n\nWhen ftrace_disabled = 1, unregister_ftrace_function simply returns without doing anything:\nunregister_ftrace_function\n ftrace_shutdown\n if (unlikely(ftrace_disabled))\n return -ENODEV; // return here, __unregister_ftrace_function is not executed,\n // as a result, ops is still in the ftrace_ops_list\n __unregister_ftrace_function\n ...\n\nIf ops is dynamically allocated, it will be free later, in this case,\nis_ftrace_trampoline accesses NULL pointer:\n\nis_ftrace_trampoline\n ftrace_ops_trampoline\n do_for_each_ftrace_op(op, ftrace_ops_list) // OOPS! op may be NULL!\n\nSyzkaller reports as follows:\n[ 1203.506103] BUG: kernel NULL pointer dereference, address: 000000000000010b\n[ 1203.508039] #PF: supervisor read access in kernel mode\n[ 1203.508798] #PF: error_code(0x0000) - not-present page\n[ 1203.509558] PGD 800000011660b067 P4D 800000011660b067 PUD 130fb8067 PMD 0\n[ 1203.510560] Oops: 0000 [#1] SMP KASAN PTI\n[ 1203.511189] CPU: 6 PID: 29532 Comm: syz-executor.2 Tainted: G B W 5.10.0 #8\n[ 1203.512324] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014\n[ 1203.513895] RIP: 0010:is_ftrace_trampoline+0x26/0xb0\n[ 1203.514644] Code: ff eb d3 90 41 55 41 54 49 89 fc 55 53 e8 f2 00 fd ff 48 8b 1d 3b 35 5d 03 e8 e6 00 fd ff 48 8d bb 90 00 00 00 e8 2a 81 26 00 \u003c48\u003e 8b ab 90 00 00 00 48 85 ed 74 1d e8 c9 00 fd ff 48 8d bb 98 00\n[ 1203.518838] RSP: 0018:ffffc900012cf960 EFLAGS: 00010246\n[ 1203.520092] RAX: 0000000000000000 RBX: 000000000000007b RCX: ffffffff8a331866\n[ 1203.521469] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 000000000000010b\n[ 1203.522583] RBP: 0000000000000000 R08: 0000000000000000 R09: ffffffff8df18b07\n[ 1203.523550] R10: fffffbfff1be3160 R11: 0000000000000001 R12: 0000000000478399\n[ 1203.524596] R13: 0000000000000000 R14: ffff888145088000 R15: 0000000000000008\n[ 1203.525634] FS: 00007f429f5f4700(0000) GS:ffff8881daf00000(0000) knlGS:0000000000000000\n[ 1203.526801] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 1203.527626] CR2: 000000000000010b CR3: 0000000170e1e001 CR4: 00000000003706e0\n[ 1203.528611] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[ 1203.529605] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n\nTherefore, when ftrace_startup_enable fails, we need to rollback registration\nprocess and remove ops from ftrace_ops_list.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-49977", "url": "https://www.suse.com/security/cve/CVE-2022-49977" }, { "category": "external", "summary": "SUSE Bug 1244936 for CVE-2022-49977", "url": "https://bugzilla.suse.com/1244936" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2022-49977" }, { "cve": "CVE-2022-49978", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-49978" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfbdev: fb_pm2fb: Avoid potential divide by zero error\n\nIn `do_fb_ioctl()` of fbmem.c, if cmd is FBIOPUT_VSCREENINFO, var will be\ncopied from user, then go through `fb_set_var()` and\n`info-\u003efbops-\u003efb_check_var()` which could may be `pm2fb_check_var()`.\nAlong the path, `var-\u003epixclock` won\u0027t be modified. This function checks\nwhether reciprocal of `var-\u003epixclock` is too high. If `var-\u003epixclock` is\nzero, there will be a divide by zero error. So, it is necessary to check\nwhether denominator is zero to avoid crash. As this bug is found by\nSyzkaller, logs are listed below.\n\ndivide error in pm2fb_check_var\nCall Trace:\n \u003cTASK\u003e\n fb_set_var+0x367/0xeb0 drivers/video/fbdev/core/fbmem.c:1015\n do_fb_ioctl+0x234/0x670 drivers/video/fbdev/core/fbmem.c:1110\n fb_ioctl+0xdd/0x130 drivers/video/fbdev/core/fbmem.c:1189", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-49978", "url": "https://www.suse.com/security/cve/CVE-2022-49978" }, { "category": "external", "summary": "SUSE Bug 1245195 for CVE-2022-49978", "url": "https://bugzilla.suse.com/1245195" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2022-49978" }, { "cve": "CVE-2022-49986", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-49986" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: storvsc: Remove WQ_MEM_RECLAIM from storvsc_error_wq\n\nstorvsc_error_wq workqueue should not be marked as WQ_MEM_RECLAIM as it\ndoesn\u0027t need to make forward progress under memory pressure. Marking this\nworkqueue as WQ_MEM_RECLAIM may cause deadlock while flushing a\nnon-WQ_MEM_RECLAIM workqueue. In the current state it causes the following\nwarning:\n\n[ 14.506347] ------------[ cut here ]------------\n[ 14.506354] workqueue: WQ_MEM_RECLAIM storvsc_error_wq_0:storvsc_remove_lun is flushing !WQ_MEM_RECLAIM events_freezable_power_:disk_events_workfn\n[ 14.506360] WARNING: CPU: 0 PID: 8 at \u003c-snip-\u003ekernel/workqueue.c:2623 check_flush_dependency+0xb5/0x130\n[ 14.506390] CPU: 0 PID: 8 Comm: kworker/u4:0 Not tainted 5.4.0-1086-azure #91~18.04.1-Ubuntu\n[ 14.506391] Hardware name: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 05/09/2022\n[ 14.506393] Workqueue: storvsc_error_wq_0 storvsc_remove_lun\n[ 14.506395] RIP: 0010:check_flush_dependency+0xb5/0x130\n\t\t\u003c-snip-\u003e\n[ 14.506408] Call Trace:\n[ 14.506412] __flush_work+0xf1/0x1c0\n[ 14.506414] __cancel_work_timer+0x12f/0x1b0\n[ 14.506417] ? kernfs_put+0xf0/0x190\n[ 14.506418] cancel_delayed_work_sync+0x13/0x20\n[ 14.506420] disk_block_events+0x78/0x80\n[ 14.506421] del_gendisk+0x3d/0x2f0\n[ 14.506423] sr_remove+0x28/0x70\n[ 14.506427] device_release_driver_internal+0xef/0x1c0\n[ 14.506428] device_release_driver+0x12/0x20\n[ 14.506429] bus_remove_device+0xe1/0x150\n[ 14.506431] device_del+0x167/0x380\n[ 14.506432] __scsi_remove_device+0x11d/0x150\n[ 14.506433] scsi_remove_device+0x26/0x40\n[ 14.506434] storvsc_remove_lun+0x40/0x60\n[ 14.506436] process_one_work+0x209/0x400\n[ 14.506437] worker_thread+0x34/0x400\n[ 14.506439] kthread+0x121/0x140\n[ 14.506440] ? process_one_work+0x400/0x400\n[ 14.506441] ? kthread_park+0x90/0x90\n[ 14.506443] ret_from_fork+0x35/0x40\n[ 14.506445] ---[ end trace 2d9633159fdc6ee7 ]---", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-49986", "url": "https://www.suse.com/security/cve/CVE-2022-49986" }, { "category": "external", "summary": "SUSE Bug 1244948 for CVE-2022-49986", "url": "https://bugzilla.suse.com/1244948" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2022-49986" }, { "cve": "CVE-2022-49987", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-49987" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmd: call __md_stop_writes in md_stop\n\nFrom the link [1], we can see raid1d was running even after the path\nraid_dtr -\u003e md_stop -\u003e __md_stop.\n\nLet\u0027s stop write first in destructor to align with normal md-raid to\nfix the KASAN issue.\n\n[1]. https://lore.kernel.org/linux-raid/CAPhsuW5gc4AakdGNdF8ubpezAuDLFOYUO_sfMZcec6hQFm8nhg@mail.gmail.com/T/#m7f12bf90481c02c6d2da68c64aeed4779b7df74a", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-49987", "url": "https://www.suse.com/security/cve/CVE-2022-49987" }, { "category": "external", "summary": "SUSE Bug 1245024 for CVE-2022-49987", "url": "https://bugzilla.suse.com/1245024" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2022-49987" }, { "cve": "CVE-2022-49990", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-49990" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ns390: fix double free of GS and RI CBs on fork() failure\n\nThe pointers for guarded storage and runtime instrumentation control\nblocks are stored in the thread_struct of the associated task. These\npointers are initially copied on fork() via arch_dup_task_struct()\nand then cleared via copy_thread() before fork() returns. If fork()\nhappens to fail after the initial task dup and before copy_thread(),\nthe newly allocated task and associated thread_struct memory are\nfreed via free_task() -\u003e arch_release_task_struct(). This results in\na double free of the guarded storage and runtime info structs\nbecause the fields in the failed task still refer to memory\nassociated with the source task.\n\nThis problem can manifest as a BUG_ON() in set_freepointer() (with\nCONFIG_SLAB_FREELIST_HARDENED enabled) or KASAN splat (if enabled)\nwhen running trinity syscall fuzz tests on s390x. To avoid this\nproblem, clear the associated pointer fields in\narch_dup_task_struct() immediately after the new task is copied.\nNote that the RI flag is still cleared in copy_thread() because it\nresides in thread stack memory and that is where stack info is\ncopied.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-49990", "url": "https://www.suse.com/security/cve/CVE-2022-49990" }, { "category": "external", "summary": "SUSE Bug 1245006 for CVE-2022-49990", "url": "https://bugzilla.suse.com/1245006" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2022-49990" }, { "cve": "CVE-2022-50008", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-50008" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nkprobes: don\u0027t call disarm_kprobe() for disabled kprobes\n\nThe assumption in __disable_kprobe() is wrong, and it could try to disarm\nan already disarmed kprobe and fire the WARN_ONCE() below. [0] We can\neasily reproduce this issue.\n\n1. Write 0 to /sys/kernel/debug/kprobes/enabled.\n\n # echo 0 \u003e /sys/kernel/debug/kprobes/enabled\n\n2. Run execsnoop. At this time, one kprobe is disabled.\n\n # /usr/share/bcc/tools/execsnoop \u0026\n [1] 2460\n PCOMM PID PPID RET ARGS\n\n # cat /sys/kernel/debug/kprobes/list\n ffffffff91345650 r __x64_sys_execve+0x0 [FTRACE]\n ffffffff91345650 k __x64_sys_execve+0x0 [DISABLED][FTRACE]\n\n3. Write 1 to /sys/kernel/debug/kprobes/enabled, which changes\n kprobes_all_disarmed to false but does not arm the disabled kprobe.\n\n # echo 1 \u003e /sys/kernel/debug/kprobes/enabled\n\n # cat /sys/kernel/debug/kprobes/list\n ffffffff91345650 r __x64_sys_execve+0x0 [FTRACE]\n ffffffff91345650 k __x64_sys_execve+0x0 [DISABLED][FTRACE]\n\n4. Kill execsnoop, when __disable_kprobe() calls disarm_kprobe() for the\n disabled kprobe and hits the WARN_ONCE() in __disarm_kprobe_ftrace().\n\n # fg\n /usr/share/bcc/tools/execsnoop\n ^C\n\nActually, WARN_ONCE() is fired twice, and __unregister_kprobe_top() misses\nsome cleanups and leaves the aggregated kprobe in the hash table. Then,\n__unregister_trace_kprobe() initialises tk-\u003erp.kp.list and creates an\ninfinite loop like this.\n\n aggregated kprobe.list -\u003e kprobe.list -.\n ^ |\n \u0027.__.\u0027\n\nIn this situation, these commands fall into the infinite loop and result\nin RCU stall or soft lockup.\n\n cat /sys/kernel/debug/kprobes/list : show_kprobe_addr() enters into the\n infinite loop with RCU.\n\n /usr/share/bcc/tools/execsnoop : warn_kprobe_rereg() holds kprobe_mutex,\n and __get_valid_kprobe() is stuck in\n\t\t\t\t the loop.\n\nTo avoid the issue, make sure we don\u0027t call disarm_kprobe() for disabled\nkprobes.\n\n[0]\nFailed to disarm kprobe-ftrace at __x64_sys_execve+0x0/0x40 (error -2)\nWARNING: CPU: 6 PID: 2460 at kernel/kprobes.c:1130 __disarm_kprobe_ftrace.isra.19 (kernel/kprobes.c:1129)\nModules linked in: ena\nCPU: 6 PID: 2460 Comm: execsnoop Not tainted 5.19.0+ #28\nHardware name: Amazon EC2 c5.2xlarge/, BIOS 1.0 10/16/2017\nRIP: 0010:__disarm_kprobe_ftrace.isra.19 (kernel/kprobes.c:1129)\nCode: 24 8b 02 eb c1 80 3d c4 83 f2 01 00 75 d4 48 8b 75 00 89 c2 48 c7 c7 90 fa 0f 92 89 04 24 c6 05 ab 83 01 e8 e4 94 f0 ff \u003c0f\u003e 0b 8b 04 24 eb b1 89 c6 48 c7 c7 60 fa 0f 92 89 04 24 e8 cc 94\nRSP: 0018:ffff9e6ec154bd98 EFLAGS: 00010282\nRAX: 0000000000000000 RBX: ffffffff930f7b00 RCX: 0000000000000001\nRDX: 0000000080000001 RSI: ffffffff921461c5 RDI: 00000000ffffffff\nRBP: ffff89c504286da8 R08: 0000000000000000 R09: c0000000fffeffff\nR10: 0000000000000000 R11: ffff9e6ec154bc28 R12: ffff89c502394e40\nR13: ffff89c502394c00 R14: ffff9e6ec154bc00 R15: 0000000000000000\nFS: 00007fe800398740(0000) GS:ffff89c812d80000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 000000c00057f010 CR3: 0000000103b54006 CR4: 00000000007706e0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nPKRU: 55555554\nCall Trace:\n\u003cTASK\u003e\n __disable_kprobe (kernel/kprobes.c:1716)\n disable_kprobe (kernel/kprobes.c:2392)\n __disable_trace_kprobe (kernel/trace/trace_kprobe.c:340)\n disable_trace_kprobe (kernel/trace/trace_kprobe.c:429)\n perf_trace_event_unreg.isra.2 (./include/linux/tracepoint.h:93 kernel/trace/trace_event_perf.c:168)\n perf_kprobe_destroy (kernel/trace/trace_event_perf.c:295)\n _free_event (kernel/events/core.c:4971)\n perf_event_release_kernel (kernel/events/core.c:5176)\n perf_release (kernel/events/core.c:5186)\n __fput (fs/file_table.c:321)\n task_work_run (./include/linux/\n---truncated---", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-50008", "url": "https://www.suse.com/security/cve/CVE-2022-50008" }, { "category": "external", "summary": "SUSE Bug 1245009 for CVE-2022-50008", "url": "https://bugzilla.suse.com/1245009" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2022-50008" }, { "cve": "CVE-2022-50012", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-50012" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/64: Init jump labels before parse_early_param()\n\nOn 64-bit, calling jump_label_init() in setup_feature_keys() is too\nlate because static keys may be used in subroutines of\nparse_early_param() which is again subroutine of early_init_devtree().\n\nFor example booting with \"threadirqs\":\n\n static_key_enable_cpuslocked(): static key \u00270xc000000002953260\u0027 used before call to jump_label_init()\n WARNING: CPU: 0 PID: 0 at kernel/jump_label.c:166 static_key_enable_cpuslocked+0xfc/0x120\n ...\n NIP static_key_enable_cpuslocked+0xfc/0x120\n LR static_key_enable_cpuslocked+0xf8/0x120\n Call Trace:\n static_key_enable_cpuslocked+0xf8/0x120 (unreliable)\n static_key_enable+0x30/0x50\n setup_forced_irqthreads+0x28/0x40\n do_early_param+0xa0/0x108\n parse_args+0x290/0x4e0\n parse_early_options+0x48/0x5c\n parse_early_param+0x58/0x84\n early_init_devtree+0xd4/0x518\n early_setup+0xb4/0x214\n\nSo call jump_label_init() just before parse_early_param() in\nearly_init_devtree().\n\n[mpe: Add call trace to change log and minor wording edits.]", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-50012", "url": "https://www.suse.com/security/cve/CVE-2022-50012" }, { "category": "external", "summary": "SUSE Bug 1245125 for CVE-2022-50012", "url": "https://bugzilla.suse.com/1245125" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2022-50012" }, { "cve": "CVE-2022-50020", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-50020" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: avoid resizing to a partial cluster size\n\nThis patch avoids an attempt to resize the filesystem to an\nunaligned cluster boundary. An online resize to a size that is not\nintegral to cluster size results in the last iteration attempting to\ngrow the fs by a negative amount, which trips a BUG_ON and leaves the fs\nwith a corrupted in-memory superblock.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-50020", "url": "https://www.suse.com/security/cve/CVE-2022-50020" }, { "category": "external", "summary": "SUSE Bug 1245129 for CVE-2022-50020", "url": "https://bugzilla.suse.com/1245129" }, { "category": "external", "summary": "SUSE Bug 1245130 for CVE-2022-50020", "url": "https://bugzilla.suse.com/1245130" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2022-50020" }, { "cve": "CVE-2022-50022", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-50022" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrivers:md:fix a potential use-after-free bug\n\nIn line 2884, \"raid5_release_stripe(sh);\" drops the reference to sh and\nmay cause sh to be released. However, sh is subsequently used in lines\n2886 \"if (sh-\u003ebatch_head \u0026\u0026 sh != sh-\u003ebatch_head)\". This may result in an\nuse-after-free bug.\n\nIt can be fixed by moving \"raid5_release_stripe(sh);\" to the bottom of\nthe function.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-50022", "url": "https://www.suse.com/security/cve/CVE-2022-50022" }, { "category": "external", "summary": "SUSE Bug 1245131 for CVE-2022-50022", "url": "https://bugzilla.suse.com/1245131" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2022-50022" }, { "cve": "CVE-2022-50045", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-50045" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/pci: Fix get_phb_number() locking\n\nThe recent change to get_phb_number() causes a DEBUG_ATOMIC_SLEEP\nwarning on some systems:\n\n BUG: sleeping function called from invalid context at kernel/locking/mutex.c:580\n in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 1, name: swapper\n preempt_count: 1, expected: 0\n RCU nest depth: 0, expected: 0\n 1 lock held by swapper/1:\n #0: c157efb0 (hose_spinlock){+.+.}-{2:2}, at: pcibios_alloc_controller+0x64/0x220\n Preemption disabled at:\n [\u003c00000000\u003e] 0x0\n CPU: 0 PID: 1 Comm: swapper Not tainted 5.19.0-yocto-standard+ #1\n Call Trace:\n [d101dc90] [c073b264] dump_stack_lvl+0x50/0x8c (unreliable)\n [d101dcb0] [c0093b70] __might_resched+0x258/0x2a8\n [d101dcd0] [c0d3e634] __mutex_lock+0x6c/0x6ec\n [d101dd50] [c0a84174] of_alias_get_id+0x50/0xf4\n [d101dd80] [c002ec78] pcibios_alloc_controller+0x1b8/0x220\n [d101ddd0] [c140c9dc] pmac_pci_init+0x198/0x784\n [d101de50] [c140852c] discover_phbs+0x30/0x4c\n [d101de60] [c0007fd4] do_one_initcall+0x94/0x344\n [d101ded0] [c1403b40] kernel_init_freeable+0x1a8/0x22c\n [d101df10] [c00086e0] kernel_init+0x34/0x160\n [d101df30] [c001b334] ret_from_kernel_thread+0x5c/0x64\n\nThis is because pcibios_alloc_controller() holds hose_spinlock but\nof_alias_get_id() takes of_mutex which can sleep.\n\nThe hose_spinlock protects the phb_bitmap, and also the hose_list, but\nit doesn\u0027t need to be held while get_phb_number() calls the OF routines,\nbecause those are only looking up information in the device tree.\n\nSo fix it by having get_phb_number() take the hose_spinlock itself, only\nwhere required, and then dropping the lock before returning.\npcibios_alloc_controller() then needs to take the lock again before the\nlist_add() but that\u0027s safe, the order of the list is not important.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-50045", "url": "https://www.suse.com/security/cve/CVE-2022-50045" }, { "category": "external", "summary": "SUSE Bug 1244967 for CVE-2022-50045", "url": "https://bugzilla.suse.com/1244967" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2022-50045" }, { "cve": "CVE-2022-50055", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-50055" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\niavf: Fix adminq error handling\n\niavf_alloc_asq_bufs/iavf_alloc_arq_bufs allocates with dma_alloc_coherent\nmemory for VF mailbox.\nFree DMA regions for both ASQ and ARQ in case error happens during\nconfiguration of ASQ/ARQ registers.\nWithout this change it is possible to see when unloading interface:\n74626.583369: dma_debug_device_change: device driver has pending DMA allocations while released from device [count=32]\nOne of leaked entries details: [device address=0x0000000b27ff9000] [size=4096 bytes] [mapped with DMA_BIDIRECTIONAL] [mapped as coherent]", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-50055", "url": "https://www.suse.com/security/cve/CVE-2022-50055" }, { "category": "external", "summary": "SUSE Bug 1245039 for CVE-2022-50055", "url": "https://bugzilla.suse.com/1245039" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2022-50055" }, { "cve": "CVE-2022-50065", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-50065" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvirtio_net: fix memory leak inside XPD_TX with mergeable\n\nWhen we call xdp_convert_buff_to_frame() to get xdpf, if it returns\nNULL, we should check if xdp_page was allocated by xdp_linearize_page().\nIf it is newly allocated, it should be freed here alone. Just like any\nother \"goto err_xdp\".", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-50065", "url": "https://www.suse.com/security/cve/CVE-2022-50065" }, { "category": "external", "summary": "SUSE Bug 1244986 for CVE-2022-50065", "url": "https://bugzilla.suse.com/1244986" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2022-50065" }, { "cve": "CVE-2022-50067", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-50067" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: unset reloc control if transaction commit fails in prepare_to_relocate()\n\nIn btrfs_relocate_block_group(), the rc is allocated. Then\nbtrfs_relocate_block_group() calls\n\nrelocate_block_group()\n prepare_to_relocate()\n set_reloc_control()\n\nthat assigns rc to the variable fs_info-\u003ereloc_ctl. When\nprepare_to_relocate() returns, it calls\n\nbtrfs_commit_transaction()\n btrfs_start_dirty_block_groups()\n btrfs_alloc_path()\n kmem_cache_zalloc()\n\nwhich may fail for example (or other errors could happen). When the\nfailure occurs, btrfs_relocate_block_group() detects the error and frees\nrc and doesn\u0027t set fs_info-\u003ereloc_ctl to NULL. After that, in\nbtrfs_init_reloc_root(), rc is retrieved from fs_info-\u003ereloc_ctl and\nthen used, which may cause a use-after-free bug.\n\nThis possible bug can be triggered by calling btrfs_ioctl_balance()\nbefore calling btrfs_ioctl_defrag().\n\nTo fix this possible bug, in prepare_to_relocate(), check if\nbtrfs_commit_transaction() fails. If the failure occurs,\nunset_reloc_control() is called to set fs_info-\u003ereloc_ctl to NULL.\n\nThe error log in our fault-injection testing is shown as follows:\n\n [ 58.751070] BUG: KASAN: use-after-free in btrfs_init_reloc_root+0x7ca/0x920 [btrfs]\n ...\n [ 58.753577] Call Trace:\n ...\n [ 58.755800] kasan_report+0x45/0x60\n [ 58.756066] btrfs_init_reloc_root+0x7ca/0x920 [btrfs]\n [ 58.757304] record_root_in_trans+0x792/0xa10 [btrfs]\n [ 58.757748] btrfs_record_root_in_trans+0x463/0x4f0 [btrfs]\n [ 58.758231] start_transaction+0x896/0x2950 [btrfs]\n [ 58.758661] btrfs_defrag_root+0x250/0xc00 [btrfs]\n [ 58.759083] btrfs_ioctl_defrag+0x467/0xa00 [btrfs]\n [ 58.759513] btrfs_ioctl+0x3c95/0x114e0 [btrfs]\n ...\n [ 58.768510] Allocated by task 23683:\n [ 58.768777] ____kasan_kmalloc+0xb5/0xf0\n [ 58.769069] __kmalloc+0x227/0x3d0\n [ 58.769325] alloc_reloc_control+0x10a/0x3d0 [btrfs]\n [ 58.769755] btrfs_relocate_block_group+0x7aa/0x1e20 [btrfs]\n [ 58.770228] btrfs_relocate_chunk+0xf1/0x760 [btrfs]\n [ 58.770655] __btrfs_balance+0x1326/0x1f10 [btrfs]\n [ 58.771071] btrfs_balance+0x3150/0x3d30 [btrfs]\n [ 58.771472] btrfs_ioctl_balance+0xd84/0x1410 [btrfs]\n [ 58.771902] btrfs_ioctl+0x4caa/0x114e0 [btrfs]\n ...\n [ 58.773337] Freed by task 23683:\n ...\n [ 58.774815] kfree+0xda/0x2b0\n [ 58.775038] free_reloc_control+0x1d6/0x220 [btrfs]\n [ 58.775465] btrfs_relocate_block_group+0x115c/0x1e20 [btrfs]\n [ 58.775944] btrfs_relocate_chunk+0xf1/0x760 [btrfs]\n [ 58.776369] __btrfs_balance+0x1326/0x1f10 [btrfs]\n [ 58.776784] btrfs_balance+0x3150/0x3d30 [btrfs]\n [ 58.777185] btrfs_ioctl_balance+0xd84/0x1410 [btrfs]\n [ 58.777621] btrfs_ioctl+0x4caa/0x114e0 [btrfs]\n ...", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-50067", "url": "https://www.suse.com/security/cve/CVE-2022-50067" }, { "category": "external", "summary": "SUSE Bug 1245047 for CVE-2022-50067", "url": "https://bugzilla.suse.com/1245047" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2022-50067" }, { "cve": "CVE-2022-50073", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-50073" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: tap: NULL pointer derefence in dev_parse_header_protocol when skb-\u003edev is null\n\nFixes a NULL pointer derefence bug triggered from tap driver.\nWhen tap_get_user calls virtio_net_hdr_to_skb the skb-\u003edev is null\n(in tap.c skb-\u003edev is set after the call to virtio_net_hdr_to_skb)\nvirtio_net_hdr_to_skb calls dev_parse_header_protocol which\nneeds skb-\u003edev field to be valid.\n\nThe line that trigers the bug is in dev_parse_header_protocol\n(dev is at offset 0x10 from skb and is stored in RAX register)\n if (!dev-\u003eheader_ops || !dev-\u003eheader_ops-\u003eparse_protocol)\n 22e1: mov 0x10(%rbx),%rax\n 22e5:\t mov 0x230(%rax),%rax\n\nSetting skb-\u003edev before the call in tap.c fixes the issue.\n\nBUG: kernel NULL pointer dereference, address: 0000000000000230\nRIP: 0010:virtio_net_hdr_to_skb.constprop.0+0x335/0x410 [tap]\nCode: c0 0f 85 b7 fd ff ff eb d4 41 39 c6 77 cf 29 c6 48 89 df 44 01 f6 e8 7a 79 83 c1 48 85 c0 0f 85 d9 fd ff ff eb b7 48 8b 43 10 \u003c48\u003e 8b 80 30 02 00 00 48 85 c0 74 55 48 8b 40 28 48 85 c0 74 4c 48\nRSP: 0018:ffffc90005c27c38 EFLAGS: 00010246\nRAX: 0000000000000000 RBX: ffff888298f25300 RCX: 0000000000000010\nRDX: 0000000000000005 RSI: ffffc90005c27cb6 RDI: ffff888298f25300\nRBP: ffffc90005c27c80 R08: 00000000ffffffea R09: 00000000000007e8\nR10: ffff88858ec77458 R11: 0000000000000000 R12: 0000000000000001\nR13: 0000000000000014 R14: ffffc90005c27e08 R15: ffffc90005c27cb6\nFS: 0000000000000000(0000) GS:ffff88858ec40000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000000000000230 CR3: 0000000281408006 CR4: 00000000003706e0\nCall Trace:\n tap_get_user+0x3f1/0x540 [tap]\n tap_sendmsg+0x56/0x362 [tap]\n ? get_tx_bufs+0xc2/0x1e0 [vhost_net]\n handle_tx_copy+0x114/0x670 [vhost_net]\n handle_tx+0xb0/0xe0 [vhost_net]\n handle_tx_kick+0x15/0x20 [vhost_net]\n vhost_worker+0x7b/0xc0 [vhost]\n ? vhost_vring_call_reset+0x40/0x40 [vhost]\n kthread+0xfa/0x120\n ? kthread_complete_and_exit+0x20/0x20\n ret_from_fork+0x1f/0x30", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-50073", "url": "https://www.suse.com/security/cve/CVE-2022-50073" }, { "category": "external", "summary": "SUSE Bug 1244978 for CVE-2022-50073", "url": "https://bugzilla.suse.com/1244978" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2022-50073" }, { "cve": "CVE-2022-50083", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-50083" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: add EXT4_INODE_HAS_XATTR_SPACE macro in xattr.h\n\nWhen adding an xattr to an inode, we must ensure that the inode_size is\nnot less than EXT4_GOOD_OLD_INODE_SIZE + extra_isize + pad. Otherwise,\nthe end position may be greater than the start position, resulting in UAF.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-50083", "url": "https://www.suse.com/security/cve/CVE-2022-50083" }, { "category": "external", "summary": "SUSE Bug 1244968 for CVE-2022-50083", "url": "https://bugzilla.suse.com/1244968" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2022-50083" }, { "cve": "CVE-2022-50084", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-50084" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm raid: fix address sanitizer warning in raid_status\n\nThere is this warning when using a kernel with the address sanitizer\nand running this testsuite:\nhttps://gitlab.com/cki-project/kernel-tests/-/tree/main/storage/swraid/scsi_raid\n\n==================================================================\nBUG: KASAN: slab-out-of-bounds in raid_status+0x1747/0x2820 [dm_raid]\nRead of size 4 at addr ffff888079d2c7e8 by task lvcreate/13319\nCPU: 0 PID: 13319 Comm: lvcreate Not tainted 5.18.0-0.rc3.\u003csnip\u003e #1\nHardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011\nCall Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x6a/0x9c\n print_address_description.constprop.0+0x1f/0x1e0\n print_report.cold+0x55/0x244\n kasan_report+0xc9/0x100\n raid_status+0x1747/0x2820 [dm_raid]\n dm_ima_measure_on_table_load+0x4b8/0xca0 [dm_mod]\n table_load+0x35c/0x630 [dm_mod]\n ctl_ioctl+0x411/0x630 [dm_mod]\n dm_ctl_ioctl+0xa/0x10 [dm_mod]\n __x64_sys_ioctl+0x12a/0x1a0\n do_syscall_64+0x5b/0x80\n\nThe warning is caused by reading conf-\u003emax_nr_stripes in raid_status. The\ncode in raid_status reads mddev-\u003eprivate, casts it to struct r5conf and\nreads the entry max_nr_stripes.\n\nHowever, if we have different raid type than 4/5/6, mddev-\u003eprivate\ndoesn\u0027t point to struct r5conf; it may point to struct r0conf, struct\nr1conf, struct r10conf or struct mpconf. If we cast a pointer to one\nof these structs to struct r5conf, we will be reading invalid memory\nand KASAN warns about it.\n\nFix this bug by reading struct r5conf only if raid type is 4, 5 or 6.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-50084", "url": "https://www.suse.com/security/cve/CVE-2022-50084" }, { "category": "external", "summary": "SUSE Bug 1245117 for CVE-2022-50084", "url": "https://bugzilla.suse.com/1245117" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2022-50084" }, { "cve": "CVE-2022-50085", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-50085" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm raid: fix address sanitizer warning in raid_resume\n\nThere is a KASAN warning in raid_resume when running the lvm test\nlvconvert-raid.sh. The reason for the warning is that mddev-\u003eraid_disks\nis greater than rs-\u003eraid_disks, so the loop touches one entry beyond\nthe allocated length.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-50085", "url": "https://www.suse.com/security/cve/CVE-2022-50085" }, { "category": "external", "summary": "SUSE Bug 1245147 for CVE-2022-50085", "url": "https://bugzilla.suse.com/1245147" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2022-50085" }, { "cve": "CVE-2022-50087", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-50087" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfirmware: arm_scpi: Ensure scpi_info is not assigned if the probe fails\n\nWhen scpi probe fails, at any point, we need to ensure that the scpi_info\nis not set and will remain NULL until the probe succeeds. If it is not\ntaken care, then it could result use-after-free as the value is exported\nvia get_scpi_ops() and could refer to a memory allocated via devm_kzalloc()\nbut freed when the probe fails.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-50087", "url": "https://www.suse.com/security/cve/CVE-2022-50087" }, { "category": "external", "summary": "SUSE Bug 1245119 for CVE-2022-50087", "url": "https://bugzilla.suse.com/1245119" }, { "category": "external", "summary": "SUSE Bug 1245294 for CVE-2022-50087", "url": "https://bugzilla.suse.com/1245294" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "important" } ], "title": "CVE-2022-50087" }, { "cve": "CVE-2022-50091", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-50091" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nlocking/csd_lock: Change csdlock_debug from early_param to __setup\n\nThe csdlock_debug kernel-boot parameter is parsed by the\nearly_param() function csdlock_debug(). If set, csdlock_debug()\ninvokes static_branch_enable() to enable csd_lock_wait feature, which\ntriggers a panic on arm64 for kernels built with CONFIG_SPARSEMEM=y and\nCONFIG_SPARSEMEM_VMEMMAP=n.\n\nWith CONFIG_SPARSEMEM_VMEMMAP=n, __nr_to_section is called in\nstatic_key_enable() and returns NULL, resulting in a NULL dereference\nbecause mem_section is initialized only later in sparse_init().\n\nThis is also a problem for powerpc because early_param() functions\nare invoked earlier than jump_label_init(), also resulting in\nstatic_key_enable() failures. These failures cause the warning \"static\nkey \u0027xxx\u0027 used before call to jump_label_init()\".\n\nThus, early_param is too early for csd_lock_wait to run\nstatic_branch_enable(), so changes it to __setup to fix these.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-50091", "url": "https://www.suse.com/security/cve/CVE-2022-50091" }, { "category": "external", "summary": "SUSE Bug 1244885 for CVE-2022-50091", "url": "https://bugzilla.suse.com/1244885" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2022-50091" }, { "cve": "CVE-2022-50092", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-50092" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm thin: fix use-after-free crash in dm_sm_register_threshold_callback\n\nFault inject on pool metadata device reports:\n BUG: KASAN: use-after-free in dm_pool_register_metadata_threshold+0x40/0x80\n Read of size 8 at addr ffff8881b9d50068 by task dmsetup/950\n\n CPU: 7 PID: 950 Comm: dmsetup Tainted: G W 5.19.0-rc6 #1\n Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-1.fc33 04/01/2014\n Call Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x34/0x44\n print_address_description.constprop.0.cold+0xeb/0x3f4\n kasan_report.cold+0xe6/0x147\n dm_pool_register_metadata_threshold+0x40/0x80\n pool_ctr+0xa0a/0x1150\n dm_table_add_target+0x2c8/0x640\n table_load+0x1fd/0x430\n ctl_ioctl+0x2c4/0x5a0\n dm_ctl_ioctl+0xa/0x10\n __x64_sys_ioctl+0xb3/0xd0\n do_syscall_64+0x35/0x80\n entry_SYSCALL_64_after_hwframe+0x46/0xb0\n\nThis can be easily reproduced using:\n echo offline \u003e /sys/block/sda/device/state\n dd if=/dev/zero of=/dev/mapper/thin bs=4k count=10\n dmsetup load pool --table \"0 20971520 thin-pool /dev/sda /dev/sdb 128 0 0\"\n\nIf a metadata commit fails, the transaction will be aborted and the\nmetadata space maps will be destroyed. If a DM table reload then\nhappens for this failed thin-pool, a use-after-free will occur in\ndm_sm_register_threshold_callback (called from\ndm_pool_register_metadata_threshold).\n\nFix this by in dm_pool_register_metadata_threshold() by returning the\n-EINVAL error if the thin-pool is in fail mode. Also fail pool_ctr()\nwith a new error message: \"Error registering metadata threshold\".", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-50092", "url": "https://www.suse.com/security/cve/CVE-2022-50092" }, { "category": "external", "summary": "SUSE Bug 1244848 for CVE-2022-50092", "url": "https://bugzilla.suse.com/1244848" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2022-50092" }, { "cve": "CVE-2022-50093", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-50093" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\niommu/vt-d: avoid invalid memory access via node_online(NUMA_NO_NODE)\n\nKASAN reports:\n\n[ 4.668325][ T0] BUG: KASAN: wild-memory-access in dmar_parse_one_rhsa (arch/x86/include/asm/bitops.h:214 arch/x86/include/asm/bitops.h:226 include/asm-generic/bitops/instrumented-non-atomic.h:142 include/linux/nodemask.h:415 drivers/iommu/intel/dmar.c:497)\n[ 4.676149][ T0] Read of size 8 at addr 1fffffff85115558 by task swapper/0/0\n[ 4.683454][ T0]\n[ 4.685638][ T0] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 5.19.0-rc3-00004-g0e862838f290 #1\n[ 4.694331][ T0] Hardware name: Supermicro SYS-5018D-FN4T/X10SDV-8C-TLN4F, BIOS 1.1 03/02/2016\n[ 4.703196][ T0] Call Trace:\n[ 4.706334][ T0] \u003cTASK\u003e\n[ 4.709133][ T0] ? dmar_parse_one_rhsa (arch/x86/include/asm/bitops.h:214 arch/x86/include/asm/bitops.h:226 include/asm-generic/bitops/instrumented-non-atomic.h:142 include/linux/nodemask.h:415 drivers/iommu/intel/dmar.c:497)\n\nafter converting the type of the first argument (@nr, bit number)\nof arch_test_bit() from `long` to `unsigned long`[0].\n\nUnder certain conditions (for example, when ACPI NUMA is disabled\nvia command line), pxm_to_node() can return %NUMA_NO_NODE (-1).\nIt is valid \u0027magic\u0027 number of NUMA node, but not valid bit number\nto use in bitops.\nnode_online() eventually descends to test_bit() without checking\nfor the input, assuming it\u0027s on caller side (which might be good\nfor perf-critical tasks). There, -1 becomes %ULONG_MAX which leads\nto an insane array index when calculating bit position in memory.\n\nFor now, add an explicit check for @node being not %NUMA_NO_NODE\nbefore calling test_bit(). The actual logics didn\u0027t change here\nat all.\n\n[0] https://github.com/norov/linux/commit/0e862838f290147ea9c16db852d8d494b552d38d", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-50093", "url": "https://www.suse.com/security/cve/CVE-2022-50093" }, { "category": "external", "summary": "SUSE Bug 1244849 for CVE-2022-50093", "url": "https://bugzilla.suse.com/1244849" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2022-50093" }, { "cve": "CVE-2022-50094", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-50094" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nspmi: trace: fix stack-out-of-bound access in SPMI tracing functions\n\ntrace_spmi_write_begin() and trace_spmi_read_end() both call\nmemcpy() with a length of \"len + 1\". This leads to one extra\nbyte being read beyond the end of the specified buffer. Fix\nthis out-of-bound memory access by using a length of \"len\"\ninstead.\n\nHere is a KASAN log showing the issue:\n\nBUG: KASAN: stack-out-of-bounds in trace_event_raw_event_spmi_read_end+0x1d0/0x234\nRead of size 2 at addr ffffffc0265b7540 by task thermal@2.0-ser/1314\n...\nCall trace:\n dump_backtrace+0x0/0x3e8\n show_stack+0x2c/0x3c\n dump_stack_lvl+0xdc/0x11c\n print_address_description+0x74/0x384\n kasan_report+0x188/0x268\n kasan_check_range+0x270/0x2b0\n memcpy+0x90/0xe8\n trace_event_raw_event_spmi_read_end+0x1d0/0x234\n spmi_read_cmd+0x294/0x3ac\n spmi_ext_register_readl+0x84/0x9c\n regmap_spmi_ext_read+0x144/0x1b0 [regmap_spmi]\n _regmap_raw_read+0x40c/0x754\n regmap_raw_read+0x3a0/0x514\n regmap_bulk_read+0x418/0x494\n adc5_gen3_poll_wait_hs+0xe8/0x1e0 [qcom_spmi_adc5_gen3]\n ...\n __arm64_sys_read+0x4c/0x60\n invoke_syscall+0x80/0x218\n el0_svc_common+0xec/0x1c8\n ...\n\naddr ffffffc0265b7540 is located in stack of task thermal@2.0-ser/1314 at offset 32 in frame:\n adc5_gen3_poll_wait_hs+0x0/0x1e0 [qcom_spmi_adc5_gen3]\n\nthis frame has 1 object:\n [32, 33) \u0027status\u0027\n\nMemory state around the buggy address:\n ffffffc0265b7400: 00 00 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1\n ffffffc0265b7480: 04 f3 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00\n\u003effffffc0265b7500: 00 00 00 00 f1 f1 f1 f1 01 f3 f3 f3 00 00 00 00\n ^\n ffffffc0265b7580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n ffffffc0265b7600: f1 f1 f1 f1 01 f2 07 f2 f2 f2 01 f3 00 00 00 00\n==================================================================", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-50094", "url": "https://www.suse.com/security/cve/CVE-2022-50094" }, { "category": "external", "summary": "SUSE Bug 1244851 for CVE-2022-50094", "url": "https://bugzilla.suse.com/1244851" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2022-50094" }, { "cve": "CVE-2022-50097", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-50097" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvideo: fbdev: s3fb: Check the size of screen before memset_io()\n\nIn the function s3fb_set_par(), the value of \u0027screen_size\u0027 is\ncalculated by the user input. If the user provides the improper value,\nthe value of \u0027screen_size\u0027 may larger than \u0027info-\u003escreen_size\u0027, which\nmay cause the following bug:\n\n[ 54.083733] BUG: unable to handle page fault for address: ffffc90003000000\n[ 54.083742] #PF: supervisor write access in kernel mode\n[ 54.083744] #PF: error_code(0x0002) - not-present page\n[ 54.083760] RIP: 0010:memset_orig+0x33/0xb0\n[ 54.083782] Call Trace:\n[ 54.083788] s3fb_set_par+0x1ec6/0x4040\n[ 54.083806] fb_set_var+0x604/0xeb0\n[ 54.083836] do_fb_ioctl+0x234/0x670\n\nFix the this by checking the value of \u0027screen_size\u0027 before memset_io().", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-50097", "url": "https://www.suse.com/security/cve/CVE-2022-50097" }, { "category": "external", "summary": "SUSE Bug 1244845 for CVE-2022-50097", "url": "https://bugzilla.suse.com/1244845" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2022-50097" }, { "cve": "CVE-2022-50098", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-50098" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla2xxx: Fix crash due to stale SRB access around I/O timeouts\n\nEnsure SRB is returned during I/O timeout error escalation. If that is not\npossible fail the escalation path.\n\nFollowing crash stack was seen:\n\nBUG: unable to handle kernel paging request at 0000002f56aa90f8\nIP: qla_chk_edif_rx_sa_delete_pending+0x14/0x30 [qla2xxx]\nCall Trace:\n ? qla2x00_status_entry+0x19f/0x1c50 [qla2xxx]\n ? qla2x00_start_sp+0x116/0x1170 [qla2xxx]\n ? dma_pool_alloc+0x1d6/0x210\n ? mempool_alloc+0x54/0x130\n ? qla24xx_process_response_queue+0x548/0x12b0 [qla2xxx]\n ? qla_do_work+0x2d/0x40 [qla2xxx]\n ? process_one_work+0x14c/0x390", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-50098", "url": "https://www.suse.com/security/cve/CVE-2022-50098" }, { "category": "external", "summary": "SUSE Bug 1244841 for CVE-2022-50098", "url": "https://bugzilla.suse.com/1244841" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2022-50098" }, { "cve": "CVE-2022-50099", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-50099" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvideo: fbdev: arkfb: Check the size of screen before memset_io()\n\nIn the function arkfb_set_par(), the value of \u0027screen_size\u0027 is\ncalculated by the user input. If the user provides the improper value,\nthe value of \u0027screen_size\u0027 may larger than \u0027info-\u003escreen_size\u0027, which\nmay cause the following bug:\n\n[ 659.399066] BUG: unable to handle page fault for address: ffffc90003000000\n[ 659.399077] #PF: supervisor write access in kernel mode\n[ 659.399079] #PF: error_code(0x0002) - not-present page\n[ 659.399094] RIP: 0010:memset_orig+0x33/0xb0\n[ 659.399116] Call Trace:\n[ 659.399122] arkfb_set_par+0x143f/0x24c0\n[ 659.399130] fb_set_var+0x604/0xeb0\n[ 659.399161] do_fb_ioctl+0x234/0x670\n[ 659.399189] fb_ioctl+0xdd/0x130\n\nFix the this by checking the value of \u0027screen_size\u0027 before memset_io().", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-50099", "url": "https://www.suse.com/security/cve/CVE-2022-50099" }, { "category": "external", "summary": "SUSE Bug 1244842 for CVE-2022-50099", "url": "https://bugzilla.suse.com/1244842" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2022-50099" }, { "cve": "CVE-2022-50101", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-50101" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvideo: fbdev: vt8623fb: Check the size of screen before memset_io()\n\nIn the function vt8623fb_set_par(), the value of \u0027screen_size\u0027 is\ncalculated by the user input. If the user provides the improper value,\nthe value of \u0027screen_size\u0027 may larger than \u0027info-\u003escreen_size\u0027, which\nmay cause the following bug:\n\n[ 583.339036] BUG: unable to handle page fault for address: ffffc90005000000\n[ 583.339049] #PF: supervisor write access in kernel mode\n[ 583.339052] #PF: error_code(0x0002) - not-present page\n[ 583.339074] RIP: 0010:memset_orig+0x33/0xb0\n[ 583.339110] Call Trace:\n[ 583.339118] vt8623fb_set_par+0x11cd/0x21e0\n[ 583.339146] fb_set_var+0x604/0xeb0\n[ 583.339181] do_fb_ioctl+0x234/0x670\n[ 583.339209] fb_ioctl+0xdd/0x130\n\nFix the this by checking the value of \u0027screen_size\u0027 before memset_io().", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-50101", "url": "https://www.suse.com/security/cve/CVE-2022-50101" }, { "category": "external", "summary": "SUSE Bug 1244839 for CVE-2022-50101", "url": "https://bugzilla.suse.com/1244839" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2022-50101" }, { "cve": "CVE-2022-50102", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-50102" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvideo: fbdev: arkfb: Fix a divide-by-zero bug in ark_set_pixclock()\n\nSince the user can control the arguments of the ioctl() from the user\nspace, under special arguments that may result in a divide-by-zero bug\nin:\n drivers/video/fbdev/arkfb.c:784: ark_set_pixclock(info, (hdiv * info-\u003evar.pixclock) / hmul);\nwith hdiv=1, pixclock=1 and hmul=2 you end up with (1*1)/2 = (int) 0.\nand then in:\n drivers/video/fbdev/arkfb.c:504: rv = dac_set_freq(par-\u003edac, 0, 1000000000 / pixclock);\nwe\u0027ll get a division-by-zero.\n\nThe following log can reveal it:\n\ndivide error: 0000 [#1] PREEMPT SMP KASAN PTI\nRIP: 0010:ark_set_pixclock drivers/video/fbdev/arkfb.c:504 [inline]\nRIP: 0010:arkfb_set_par+0x10fc/0x24c0 drivers/video/fbdev/arkfb.c:784\nCall Trace:\n fb_set_var+0x604/0xeb0 drivers/video/fbdev/core/fbmem.c:1034\n do_fb_ioctl+0x234/0x670 drivers/video/fbdev/core/fbmem.c:1110\n fb_ioctl+0xdd/0x130 drivers/video/fbdev/core/fbmem.c:1189\n\nFix this by checking the argument of ark_set_pixclock() first.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-50102", "url": "https://www.suse.com/security/cve/CVE-2022-50102" }, { "category": "external", "summary": "SUSE Bug 1244838 for CVE-2022-50102", "url": "https://bugzilla.suse.com/1244838" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2022-50102" }, { "cve": "CVE-2022-50104", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-50104" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/xive: Fix refcount leak in xive_get_max_prio\n\nof_find_node_by_path() returns a node pointer with\nrefcount incremented, we should use of_node_put() on it when done.\nAdd missing of_node_put() to avoid refcount leak.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-50104", "url": "https://www.suse.com/security/cve/CVE-2022-50104" }, { "category": "external", "summary": "SUSE Bug 1244836 for CVE-2022-50104", "url": "https://bugzilla.suse.com/1244836" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2022-50104" }, { "cve": "CVE-2022-50109", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-50109" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvideo: fbdev: amba-clcd: Fix refcount leak bugs\n\nIn clcdfb_of_init_display(), we should call of_node_put() for the\nreferences returned by of_graph_get_next_endpoint() and\nof_graph_get_remote_port_parent() which have increased the refcount.\n\nBesides, we should call of_node_put() both in fail path or when\nthe references are not used anymore.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-50109", "url": "https://www.suse.com/security/cve/CVE-2022-50109" }, { "category": "external", "summary": "SUSE Bug 1244884 for CVE-2022-50109", "url": "https://bugzilla.suse.com/1244884" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2022-50109" }, { "cve": "CVE-2022-50126", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-50126" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\njbd2: fix assertion \u0027jh-\u003eb_frozen_data == NULL\u0027 failure when journal aborted\n\nFollowing process will fail assertion \u0027jh-\u003eb_frozen_data == NULL\u0027 in\njbd2_journal_dirty_metadata():\n\n jbd2_journal_commit_transaction\nunlink(dir/a)\n jh-\u003eb_transaction = trans1\n jh-\u003eb_jlist = BJ_Metadata\n journal-\u003ej_running_transaction = NULL\n trans1-\u003et_state = T_COMMIT\nunlink(dir/b)\n handle-\u003eh_trans = trans2\n do_get_write_access\n jh-\u003eb_modified = 0\n jh-\u003eb_frozen_data = frozen_buffer\n jh-\u003eb_next_transaction = trans2\n jbd2_journal_dirty_metadata\n is_handle_aborted\n is_journal_aborted // return false\n\n --\u003e jbd2 abort \u003c--\n\n while (commit_transaction-\u003et_buffers)\n if (is_journal_aborted)\n jbd2_journal_refile_buffer\n __jbd2_journal_refile_buffer\n WRITE_ONCE(jh-\u003eb_transaction,\n\t\t\t\t\t\tjh-\u003eb_next_transaction)\n WRITE_ONCE(jh-\u003eb_next_transaction, NULL)\n __jbd2_journal_file_buffer(jh, BJ_Reserved)\n J_ASSERT_JH(jh, jh-\u003eb_frozen_data == NULL) // assertion failure !\n\nThe reproducer (See detail in [Link]) reports:\n ------------[ cut here ]------------\n kernel BUG at fs/jbd2/transaction.c:1629!\n invalid opcode: 0000 [#1] PREEMPT SMP\n CPU: 2 PID: 584 Comm: unlink Tainted: G W\n 5.19.0-rc6-00115-g4a57a8400075-dirty #697\n RIP: 0010:jbd2_journal_dirty_metadata+0x3c5/0x470\n RSP: 0018:ffffc90000be7ce0 EFLAGS: 00010202\n Call Trace:\n \u003cTASK\u003e\n __ext4_handle_dirty_metadata+0xa0/0x290\n ext4_handle_dirty_dirblock+0x10c/0x1d0\n ext4_delete_entry+0x104/0x200\n __ext4_unlink+0x22b/0x360\n ext4_unlink+0x275/0x390\n vfs_unlink+0x20b/0x4c0\n do_unlinkat+0x42f/0x4c0\n __x64_sys_unlink+0x37/0x50\n do_syscall_64+0x35/0x80\n\nAfter journal aborting, __jbd2_journal_refile_buffer() is executed with\nholding @jh-\u003eb_state_lock, we can fix it by moving \u0027is_handle_aborted()\u0027\ninto the area protected by @jh-\u003eb_state_lock.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-50126", "url": "https://www.suse.com/security/cve/CVE-2022-50126" }, { "category": "external", "summary": "SUSE Bug 1244813 for CVE-2022-50126", "url": "https://bugzilla.suse.com/1244813" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2022-50126" }, { "cve": "CVE-2022-50134", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-50134" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/hfi1: fix potential memory leak in setup_base_ctxt()\n\nsetup_base_ctxt() allocates a memory chunk for uctxt-\u003egroups with\nhfi1_alloc_ctxt_rcv_groups(). When init_user_ctxt() fails, uctxt-\u003egroups\nis not released, which will lead to a memory leak.\n\nWe should release the uctxt-\u003egroups with hfi1_free_ctxt_rcv_groups()\nwhen init_user_ctxt() fails.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-50134", "url": "https://www.suse.com/security/cve/CVE-2022-50134" }, { "category": "external", "summary": "SUSE Bug 1244802 for CVE-2022-50134", "url": "https://bugzilla.suse.com/1244802" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2022-50134" }, { "cve": "CVE-2022-50146", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-50146" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nPCI: dwc: Deallocate EPC memory on dw_pcie_ep_init() errors\n\nIf dw_pcie_ep_init() fails to perform any action after the EPC memory is\ninitialized and the MSI memory region is allocated, the latter parts won\u0027t\nbe undone thus causing a memory leak. Add a cleanup-on-error path to fix\nthese leaks.\n\n[bhelgaas: commit log]", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-50146", "url": "https://www.suse.com/security/cve/CVE-2022-50146" }, { "category": "external", "summary": "SUSE Bug 1244788 for CVE-2022-50146", "url": "https://bugzilla.suse.com/1244788" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2022-50146" }, { "cve": "CVE-2022-50152", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-50152" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: ohci-nxp: Fix refcount leak in ohci_hcd_nxp_probe\n\nof_parse_phandle() returns a node pointer with refcount\nincremented, we should use of_node_put() on it when not need anymore.\nAdd missing of_node_put() to avoid refcount leak.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-50152", "url": "https://www.suse.com/security/cve/CVE-2022-50152" }, { "category": "external", "summary": "SUSE Bug 1244783 for CVE-2022-50152", "url": "https://bugzilla.suse.com/1244783" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2022-50152" }, { "cve": "CVE-2022-50153", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-50153" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: host: Fix refcount leak in ehci_hcd_ppc_of_probe\n\nof_find_compatible_node() returns a node pointer with refcount\nincremented, we should use of_node_put() on it when done.\nAdd missing of_node_put() to avoid refcount leak.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-50153", "url": "https://www.suse.com/security/cve/CVE-2022-50153" }, { "category": "external", "summary": "SUSE Bug 1244786 for CVE-2022-50153", "url": "https://bugzilla.suse.com/1244786" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2022-50153" }, { "cve": "CVE-2022-50173", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-50173" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/msm/mdp5: Fix global state lock backoff\n\nWe need to grab the lock after the early return for !hwpipe case.\nOtherwise, we could have hit contention yet still returned 0.\n\nFixes an issue that the new CONFIG_DRM_DEBUG_MODESET_LOCK stuff flagged\nin CI:\n\n WARNING: CPU: 0 PID: 282 at drivers/gpu/drm/drm_modeset_lock.c:296 drm_modeset_lock+0xf8/0x154\n Modules linked in:\n CPU: 0 PID: 282 Comm: kms_cursor_lega Tainted: G W 5.19.0-rc2-15930-g875cc8bc536a #1\n Hardware name: Qualcomm Technologies, Inc. DB820c (DT)\n pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n pc : drm_modeset_lock+0xf8/0x154\n lr : drm_atomic_get_private_obj_state+0x84/0x170\n sp : ffff80000cfab6a0\n x29: ffff80000cfab6a0 x28: 0000000000000000 x27: ffff000083bc4d00\n x26: 0000000000000038 x25: 0000000000000000 x24: ffff80000957ca58\n x23: 0000000000000000 x22: ffff000081ace080 x21: 0000000000000001\n x20: ffff000081acec18 x19: ffff80000cfabb80 x18: 0000000000000038\n x17: 0000000000000000 x16: 0000000000000000 x15: fffffffffffea0d0\n x14: 0000000000000000 x13: 284e4f5f4e524157 x12: 5f534b434f4c5f47\n x11: ffff80000a386aa8 x10: 0000000000000029 x9 : ffff80000cfab610\n x8 : 0000000000000029 x7 : 0000000000000014 x6 : 0000000000000000\n x5 : 0000000000000001 x4 : ffff8000081ad904 x3 : 0000000000000029\n x2 : ffff0000801db4c0 x1 : ffff80000cfabb80 x0 : ffff000081aceb58\n Call trace:\n drm_modeset_lock+0xf8/0x154\n drm_atomic_get_private_obj_state+0x84/0x170\n mdp5_get_global_state+0x54/0x6c\n mdp5_pipe_release+0x2c/0xd4\n mdp5_plane_atomic_check+0x2ec/0x414\n drm_atomic_helper_check_planes+0xd8/0x210\n drm_atomic_helper_check+0x54/0xb0\n ...\n ---[ end trace 0000000000000000 ]---\n drm_modeset_lock attempting to lock a contended lock without backoff:\n drm_modeset_lock+0x148/0x154\n mdp5_get_global_state+0x30/0x6c\n mdp5_pipe_release+0x2c/0xd4\n mdp5_plane_atomic_check+0x290/0x414\n drm_atomic_helper_check_planes+0xd8/0x210\n drm_atomic_helper_check+0x54/0xb0\n drm_atomic_check_only+0x4b0/0x8f4\n drm_atomic_commit+0x68/0xe0\n\nPatchwork: https://patchwork.freedesktop.org/patch/492701/", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-50173", "url": "https://www.suse.com/security/cve/CVE-2022-50173" }, { "category": "external", "summary": "SUSE Bug 1244992 for CVE-2022-50173", "url": "https://bugzilla.suse.com/1244992" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2022-50173" }, { "cve": "CVE-2022-50179", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-50179" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nath9k: fix use-after-free in ath9k_hif_usb_rx_cb\n\nSyzbot reported use-after-free Read in ath9k_hif_usb_rx_cb() [0]. The\nproblem was in incorrect htc_handle-\u003edrv_priv initialization.\n\nProbable call trace which can trigger use-after-free:\n\nath9k_htc_probe_device()\n /* htc_handle-\u003edrv_priv = priv; */\n ath9k_htc_wait_for_target() \u003c--- Failed\n ieee80211_free_hw()\t\t \u003c--- priv pointer is freed\n\n\u003cIRQ\u003e\n...\nath9k_hif_usb_rx_cb()\n ath9k_hif_usb_rx_stream()\n RX_STAT_INC()\t\t\u003c--- htc_handle-\u003edrv_priv access\n\nIn order to not add fancy protection for drv_priv we can move\nhtc_handle-\u003edrv_priv initialization at the end of the\nath9k_htc_probe_device() and add helper macro to make\nall *_STAT_* macros NULL safe, since syzbot has reported related NULL\nderef in that macros [1]", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-50179", "url": "https://www.suse.com/security/cve/CVE-2022-50179" }, { "category": "external", "summary": "SUSE Bug 1244886 for CVE-2022-50179", "url": "https://bugzilla.suse.com/1244886" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2022-50179" }, { "cve": "CVE-2022-50181", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-50181" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvirtio-gpu: fix a missing check to avoid NULL dereference\n\n\u0027cache_ent\u0027 could be set NULL inside virtio_gpu_cmd_get_capset()\nand it will lead to a NULL dereference by a lately use of it\n(i.e., ptr = cache_ent-\u003ecaps_cache). Fix it with a NULL check.\n\n\n[ kraxel: minor codestyle fixup ]", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-50181", "url": "https://www.suse.com/security/cve/CVE-2022-50181" }, { "category": "external", "summary": "SUSE Bug 1244901 for CVE-2022-50181", "url": "https://bugzilla.suse.com/1244901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2022-50181" }, { "cve": "CVE-2022-50200", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-50200" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nselinux: Add boundary check in put_entry()\n\nJust like next_entry(), boundary check is necessary to prevent memory\nout-of-bound access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-50200", "url": "https://www.suse.com/security/cve/CVE-2022-50200" }, { "category": "external", "summary": "SUSE Bug 1245149 for CVE-2022-50200", "url": "https://bugzilla.suse.com/1245149" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "important" } ], "title": "CVE-2022-50200" }, { "cve": "CVE-2022-50206", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-50206" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\narm64: fix oops in concurrently setting insn_emulation sysctls\n\nemulation_proc_handler() changes table-\u003edata for proc_dointvec_minmax\nand can generate the following Oops if called concurrently with itself:\n\n | Unable to handle kernel NULL pointer dereference at virtual address 0000000000000010\n | Internal error: Oops: 96000006 [#1] SMP\n | Call trace:\n | update_insn_emulation_mode+0xc0/0x148\n | emulation_proc_handler+0x64/0xb8\n | proc_sys_call_handler+0x9c/0xf8\n | proc_sys_write+0x18/0x20\n | __vfs_write+0x20/0x48\n | vfs_write+0xe4/0x1d0\n | ksys_write+0x70/0xf8\n | __arm64_sys_write+0x20/0x28\n | el0_svc_common.constprop.0+0x7c/0x1c0\n | el0_svc_handler+0x2c/0xa0\n | el0_svc+0x8/0x200\n\nTo fix this issue, keep the table-\u003edata as \u0026insn-\u003ecurrent_mode and\nuse container_of() to retrieve the insn pointer. Another mutex is\nused to protect against the current_mode update but not for retrieving\ninsn_emulation as table-\u003edata is no longer changing.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-50206", "url": "https://www.suse.com/security/cve/CVE-2022-50206" }, { "category": "external", "summary": "SUSE Bug 1245152 for CVE-2022-50206", "url": "https://bugzilla.suse.com/1245152" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2022-50206" }, { "cve": "CVE-2022-50211", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-50211" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmd-raid10: fix KASAN warning\n\nThere\u0027s a KASAN warning in raid10_remove_disk when running the lvm\ntest lvconvert-raid-reshape.sh. We fix this warning by verifying that the\nvalue \"number\" is valid.\n\nBUG: KASAN: slab-out-of-bounds in raid10_remove_disk+0x61/0x2a0 [raid10]\nRead of size 8 at addr ffff889108f3d300 by task mdX_raid10/124682\n\nCPU: 3 PID: 124682 Comm: mdX_raid10 Not tainted 5.19.0-rc6 #1\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-2 04/01/2014\nCall Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x34/0x44\n print_report.cold+0x45/0x57a\n ? __lock_text_start+0x18/0x18\n ? raid10_remove_disk+0x61/0x2a0 [raid10]\n kasan_report+0xa8/0xe0\n ? raid10_remove_disk+0x61/0x2a0 [raid10]\n raid10_remove_disk+0x61/0x2a0 [raid10]\nBuffer I/O error on dev dm-76, logical block 15344, async page read\n ? __mutex_unlock_slowpath.constprop.0+0x1e0/0x1e0\n remove_and_add_spares+0x367/0x8a0 [md_mod]\n ? super_written+0x1c0/0x1c0 [md_mod]\n ? mutex_trylock+0xac/0x120\n ? _raw_spin_lock+0x72/0xc0\n ? _raw_spin_lock_bh+0xc0/0xc0\n md_check_recovery+0x848/0x960 [md_mod]\n raid10d+0xcf/0x3360 [raid10]\n ? sched_clock_cpu+0x185/0x1a0\n ? rb_erase+0x4d4/0x620\n ? var_wake_function+0xe0/0xe0\n ? psi_group_change+0x411/0x500\n ? preempt_count_sub+0xf/0xc0\n ? _raw_spin_lock_irqsave+0x78/0xc0\n ? __lock_text_start+0x18/0x18\n ? raid10_sync_request+0x36c0/0x36c0 [raid10]\n ? preempt_count_sub+0xf/0xc0\n ? _raw_spin_unlock_irqrestore+0x19/0x40\n ? del_timer_sync+0xa9/0x100\n ? try_to_del_timer_sync+0xc0/0xc0\n ? _raw_spin_lock_irqsave+0x78/0xc0\n ? __lock_text_start+0x18/0x18\n ? _raw_spin_unlock_irq+0x11/0x24\n ? __list_del_entry_valid+0x68/0xa0\n ? finish_wait+0xa3/0x100\n md_thread+0x161/0x260 [md_mod]\n ? unregister_md_personality+0xa0/0xa0 [md_mod]\n ? _raw_spin_lock_irqsave+0x78/0xc0\n ? prepare_to_wait_event+0x2c0/0x2c0\n ? unregister_md_personality+0xa0/0xa0 [md_mod]\n kthread+0x148/0x180\n ? kthread_complete_and_exit+0x20/0x20\n ret_from_fork+0x1f/0x30\n \u003c/TASK\u003e\n\nAllocated by task 124495:\n kasan_save_stack+0x1e/0x40\n __kasan_kmalloc+0x80/0xa0\n setup_conf+0x140/0x5c0 [raid10]\n raid10_run+0x4cd/0x740 [raid10]\n md_run+0x6f9/0x1300 [md_mod]\n raid_ctr+0x2531/0x4ac0 [dm_raid]\n dm_table_add_target+0x2b0/0x620 [dm_mod]\n table_load+0x1c8/0x400 [dm_mod]\n ctl_ioctl+0x29e/0x560 [dm_mod]\n dm_compat_ctl_ioctl+0x7/0x20 [dm_mod]\n __do_compat_sys_ioctl+0xfa/0x160\n do_syscall_64+0x90/0xc0\n entry_SYSCALL_64_after_hwframe+0x46/0xb0\n\nLast potentially related work creation:\n kasan_save_stack+0x1e/0x40\n __kasan_record_aux_stack+0x9e/0xc0\n kvfree_call_rcu+0x84/0x480\n timerfd_release+0x82/0x140\nL __fput+0xfa/0x400\n task_work_run+0x80/0xc0\n exit_to_user_mode_prepare+0x155/0x160\n syscall_exit_to_user_mode+0x12/0x40\n do_syscall_64+0x42/0xc0\n entry_SYSCALL_64_after_hwframe+0x46/0xb0\n\nSecond to last potentially related work creation:\n kasan_save_stack+0x1e/0x40\n __kasan_record_aux_stack+0x9e/0xc0\n kvfree_call_rcu+0x84/0x480\n timerfd_release+0x82/0x140\n __fput+0xfa/0x400\n task_work_run+0x80/0xc0\n exit_to_user_mode_prepare+0x155/0x160\n syscall_exit_to_user_mode+0x12/0x40\n do_syscall_64+0x42/0xc0\n entry_SYSCALL_64_after_hwframe+0x46/0xb0\n\nThe buggy address belongs to the object at ffff889108f3d200\n which belongs to the cache kmalloc-256 of size 256\nThe buggy address is located 0 bytes to the right of\n 256-byte region [ffff889108f3d200, ffff889108f3d300)\n\nThe buggy address belongs to the physical page:\npage:000000007ef2a34c refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1108f3c\nhead:000000007ef2a34c order:2 compound_mapcount:0 compound_pincount:0\nflags: 0x4000000000010200(slab|head|zone=2)\nraw: 4000000000010200 0000000000000000 dead000000000001 ffff889100042b40\nraw: 0000000000000000 0000000080200020 00000001ffffffff 0000000000000000\npage dumped because: kasan: bad access detected\n\nMemory state around the buggy address:\n ffff889108f3d200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n ffff889108f3d280: 00 00\n---truncated---", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-50211", "url": "https://www.suse.com/security/cve/CVE-2022-50211" }, { "category": "external", "summary": "SUSE Bug 1245140 for CVE-2022-50211", "url": "https://bugzilla.suse.com/1245140" }, { "category": "external", "summary": "SUSE Bug 1245141 for CVE-2022-50211", "url": "https://bugzilla.suse.com/1245141" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "important" } ], "title": "CVE-2022-50211" }, { "cve": "CVE-2022-50213", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-50213" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: do not allow SET_ID to refer to another table\n\nWhen doing lookups for sets on the same batch by using its ID, a set from a\ndifferent table can be used.\n\nThen, when the table is removed, a reference to the set may be kept after\nthe set is freed, leading to a potential use-after-free.\n\nWhen looking for sets by ID, use the table that was used for the lookup by\nname, and only return sets belonging to that same table.\n\nThis fixes CVE-2022-2586, also reported as ZDI-CAN-17470.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-50213", "url": "https://www.suse.com/security/cve/CVE-2022-50213" }, { "category": "external", "summary": "SUSE Bug 1244867 for CVE-2022-50213", "url": "https://bugzilla.suse.com/1244867" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2022-50213" }, { "cve": "CVE-2022-50215", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-50215" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: sg: Allow waiting for commands to complete on removed device\n\nWhen a SCSI device is removed while in active use, currently sg will\nimmediately return -ENODEV on any attempt to wait for active commands that\nwere sent before the removal. This is problematic for commands that use\nSG_FLAG_DIRECT_IO since the data buffer may still be in use by the kernel\nwhen userspace frees or reuses it after getting ENODEV, leading to\ncorrupted userspace memory (in the case of READ-type commands) or corrupted\ndata being sent to the device (in the case of WRITE-type commands). This\nhas been seen in practice when logging out of a iscsi_tcp session, where\nthe iSCSI driver may still be processing commands after the device has been\nmarked for removal.\n\nChange the policy to allow userspace to wait for active sg commands even\nwhen the device is being removed. Return -ENODEV only when there are no\nmore responses to read.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-50215", "url": "https://www.suse.com/security/cve/CVE-2022-50215" }, { "category": "external", "summary": "SUSE Bug 1245138 for CVE-2022-50215", "url": "https://bugzilla.suse.com/1245138" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2022-50215" }, { "cve": "CVE-2022-50220", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-50220" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusbnet: Fix linkwatch use-after-free on disconnect\n\nusbnet uses the work usbnet_deferred_kevent() to perform tasks which may\nsleep. On disconnect, completion of the work was originally awaited in\n-\u003endo_stop(). But in 2003, that was moved to -\u003edisconnect() by historic\ncommit \"[PATCH] USB: usbnet, prevent exotic rtnl deadlock\":\n\n https://git.kernel.org/tglx/history/c/0f138bbfd83c\n\nThe change was made because back then, the kernel\u0027s workqueue\nimplementation did not allow waiting for a single work. One had to wait\nfor completion of *all* work by calling flush_scheduled_work(), and that\ncould deadlock when waiting for usbnet_deferred_kevent() with rtnl_mutex\nheld in -\u003endo_stop().\n\nThe commit solved one problem but created another: It causes a\nuse-after-free in USB Ethernet drivers aqc111.c, asix_devices.c,\nax88179_178a.c, ch9200.c and smsc75xx.c:\n\n* If the drivers receive a link change interrupt immediately before\n disconnect, they raise EVENT_LINK_RESET in their (non-sleepable)\n -\u003estatus() callback and schedule usbnet_deferred_kevent().\n* usbnet_deferred_kevent() invokes the driver\u0027s -\u003elink_reset() callback,\n which calls netif_carrier_{on,off}().\n* That in turn schedules the work linkwatch_event().\n\nBecause usbnet_deferred_kevent() is awaited after unregister_netdev(),\nnetif_carrier_{on,off}() may operate on an unregistered netdev and\nlinkwatch_event() may run after free_netdev(), causing a use-after-free.\n\nIn 2010, usbnet was changed to only wait for a single instance of\nusbnet_deferred_kevent() instead of *all* work by commit 23f333a2bfaf\n(\"drivers/net: don\u0027t use flush_scheduled_work()\").\n\nUnfortunately the commit neglected to move the wait back to\n-\u003endo_stop(). Rectify that omission at long last.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-50220", "url": "https://www.suse.com/security/cve/CVE-2022-50220" }, { "category": "external", "summary": "SUSE Bug 1245348 for CVE-2022-50220", "url": "https://bugzilla.suse.com/1245348" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2022-50220" }, { "cve": "CVE-2023-1989", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1989" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in btsdio_remove in drivers\\bluetooth\\btsdio.c in the Linux Kernel. In this flaw, a call to btsdio_remove with an unfinished job, may cause a race problem leading to a UAF on hdev devices.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1989", "url": "https://www.suse.com/security/cve/CVE-2023-1989" }, { "category": "external", "summary": "SUSE Bug 1210336 for CVE-2023-1989", "url": "https://bugzilla.suse.com/1210336" }, { "category": "external", "summary": "SUSE Bug 1210500 for CVE-2023-1989", "url": "https://bugzilla.suse.com/1210500" }, { "category": "external", "summary": "SUSE Bug 1213841 for CVE-2023-1989", "url": "https://bugzilla.suse.com/1213841" }, { "category": "external", "summary": "SUSE Bug 1213842 for CVE-2023-1989", "url": "https://bugzilla.suse.com/1213842" }, { "category": "external", "summary": "SUSE Bug 1214128 for CVE-2023-1989", "url": "https://bugzilla.suse.com/1214128" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "important" } ], "title": "CVE-2023-1989" }, { "cve": "CVE-2023-3111", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-3111" } ], "notes": [ { "category": "general", "text": "A use after free vulnerability was found in prepare_to_relocate in fs/btrfs/relocation.c in btrfs in the Linux Kernel. This possible flaw can be triggered by calling btrfs_ioctl_balance() before calling btrfs_ioctl_defrag().", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-3111", "url": "https://www.suse.com/security/cve/CVE-2023-3111" }, { "category": "external", "summary": "SUSE Bug 1212051 for CVE-2023-3111", "url": "https://bugzilla.suse.com/1212051" }, { "category": "external", "summary": "SUSE Bug 1220015 for CVE-2023-3111", "url": "https://bugzilla.suse.com/1220015" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2023-3111" }, { "cve": "CVE-2023-52500", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-52500" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command\n\nTags allocated for OPC_INB_SET_CONTROLLER_CONFIG command need to be freed\nwhen we receive the response.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-52500", "url": "https://www.suse.com/security/cve/CVE-2023-52500" }, { "category": "external", "summary": "SUSE Bug 1220883 for CVE-2023-52500", "url": "https://bugzilla.suse.com/1220883" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2023-52500" }, { "cve": "CVE-2023-52927", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-52927" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: allow exp not to be removed in nf_ct_find_expectation\n\nCurrently nf_conntrack_in() calling nf_ct_find_expectation() will\nremove the exp from the hash table. However, in some scenario, we\nexpect the exp not to be removed when the created ct will not be\nconfirmed, like in OVS and TC conntrack in the following patches.\n\nThis patch allows exp not to be removed by setting IPS_CONFIRMED\nin the status of the tmpl.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-52927", "url": "https://www.suse.com/security/cve/CVE-2023-52927" }, { "category": "external", "summary": "SUSE Bug 1239644 for CVE-2023-52927", "url": "https://bugzilla.suse.com/1239644" }, { "category": "external", "summary": "SUSE Bug 1246016 for CVE-2023-52927", "url": "https://bugzilla.suse.com/1246016" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "important" } ], "title": "CVE-2023-52927" }, { "cve": "CVE-2023-53020", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-53020" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nl2tp: close all race conditions in l2tp_tunnel_register()\n\nThe code in l2tp_tunnel_register() is racy in several ways:\n\n1. It modifies the tunnel socket _after_ publishing it.\n\n2. It calls setup_udp_tunnel_sock() on an existing socket without\n locking.\n\n3. It changes sock lock class on fly, which triggers many syzbot\n reports.\n\nThis patch amends all of them by moving socket initialization code\nbefore publishing and under sock lock. As suggested by Jakub, the\nl2tp lockdep class is not necessary as we can just switch to\nbh_lock_sock_nested().", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-53020", "url": "https://www.suse.com/security/cve/CVE-2023-53020" }, { "category": "external", "summary": "SUSE Bug 1240224 for CVE-2023-53020", "url": "https://bugzilla.suse.com/1240224" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2023-53020" }, { "cve": "CVE-2023-53063", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-53063" } ], "notes": [ { "category": "general", "text": "This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-53063", "url": "https://www.suse.com/security/cve/CVE-2023-53063" }, { "category": "external", "summary": "SUSE Bug 1242216 for CVE-2023-53063", "url": "https://bugzilla.suse.com/1242216" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2023-53063" }, { "cve": "CVE-2023-53081", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-53081" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocfs2: fix data corruption after failed write\n\nWhen buffered write fails to copy data into underlying page cache page,\nocfs2_write_end_nolock() just zeroes out and dirties the page. This can\nleave dirty page beyond EOF and if page writeback tries to write this page\nbefore write succeeds and expands i_size, page gets into inconsistent\nstate where page dirty bit is clear but buffer dirty bits stay set\nresulting in page data never getting written and so data copied to the\npage is lost. Fix the problem by invalidating page beyond EOF after\nfailed write.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-53081", "url": "https://www.suse.com/security/cve/CVE-2023-53081" }, { "category": "external", "summary": "SUSE Bug 1242281 for CVE-2023-53081", "url": "https://bugzilla.suse.com/1242281" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2023-53081" }, { "cve": "CVE-2023-53090", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-53090" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdkfd: Fix an illegal memory access\n\nIn the kfd_wait_on_events() function, the kfd_event_waiter structure is\nallocated by alloc_event_waiters(), but the event field of the waiter\nstructure is not initialized; When copy_from_user() fails in the\nkfd_wait_on_events() function, it will enter exception handling to\nrelease the previously allocated memory of the waiter structure;\nDue to the event field of the waiters structure being accessed\nin the free_waiters() function, this results in illegal memory access\nand system crash, here is the crash log:\n\nlocalhost kernel: RIP: 0010:native_queued_spin_lock_slowpath+0x185/0x1e0\nlocalhost kernel: RSP: 0018:ffffaa53c362bd60 EFLAGS: 00010082\nlocalhost kernel: RAX: ff3d3d6bff4007cb RBX: 0000000000000282 RCX: 00000000002c0000\nlocalhost kernel: RDX: ffff9e855eeacb80 RSI: 000000000000279c RDI: ffffe7088f6a21d0\nlocalhost kernel: RBP: ffffe7088f6a21d0 R08: 00000000002c0000 R09: ffffaa53c362be64\nlocalhost kernel: R10: ffffaa53c362bbd8 R11: 0000000000000001 R12: 0000000000000002\nlocalhost kernel: R13: ffff9e7ead15d600 R14: 0000000000000000 R15: ffff9e7ead15d698\nlocalhost kernel: FS: 0000152a3d111700(0000) GS:ffff9e855ee80000(0000) knlGS:0000000000000000\nlocalhost kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nlocalhost kernel: CR2: 0000152938000010 CR3: 000000044d7a4000 CR4: 00000000003506e0\nlocalhost kernel: Call Trace:\nlocalhost kernel: _raw_spin_lock_irqsave+0x30/0x40\nlocalhost kernel: remove_wait_queue+0x12/0x50\nlocalhost kernel: kfd_wait_on_events+0x1b6/0x490 [hydcu]\nlocalhost kernel: ? ftrace_graph_caller+0xa0/0xa0\nlocalhost kernel: kfd_ioctl+0x38c/0x4a0 [hydcu]\nlocalhost kernel: ? kfd_ioctl_set_trap_handler+0x70/0x70 [hydcu]\nlocalhost kernel: ? kfd_ioctl_create_queue+0x5a0/0x5a0 [hydcu]\nlocalhost kernel: ? ftrace_graph_caller+0xa0/0xa0\nlocalhost kernel: __x64_sys_ioctl+0x8e/0xd0\nlocalhost kernel: ? syscall_trace_enter.isra.18+0x143/0x1b0\nlocalhost kernel: do_syscall_64+0x33/0x80\nlocalhost kernel: entry_SYSCALL_64_after_hwframe+0x44/0xa9\nlocalhost kernel: RIP: 0033:0x152a4dff68d7\n\nAllocate the structure with kcalloc, and remove redundant 0-initialization\nand a redundant loop condition check.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-53090", "url": "https://www.suse.com/security/cve/CVE-2023-53090" }, { "category": "external", "summary": "SUSE Bug 1242753 for CVE-2023-53090", "url": "https://bugzilla.suse.com/1242753" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2023-53090" }, { "cve": "CVE-2023-53091", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-53091" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: update s_journal_inum if it changes after journal replay\n\nWhen mounting a crafted ext4 image, s_journal_inum may change after journal\nreplay, which is obviously unreasonable because we have successfully loaded\nand replayed the journal through the old s_journal_inum. And the new\ns_journal_inum bypasses some of the checks in ext4_get_journal(), which\nmay trigger a null pointer dereference problem. So if s_journal_inum\nchanges after the journal replay, we ignore the change, and rewrite the\ncurrent journal_inum to the superblock.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-53091", "url": "https://www.suse.com/security/cve/CVE-2023-53091" }, { "category": "external", "summary": "SUSE Bug 1242767 for CVE-2023-53091", "url": "https://bugzilla.suse.com/1242767" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2023-53091" }, { "cve": "CVE-2023-53133", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-53133" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf, sockmap: Fix an infinite loop error when len is 0 in tcp_bpf_recvmsg_parser()\n\nWhen the buffer length of the recvmsg system call is 0, we got the\nflollowing soft lockup problem:\n\nwatchdog: BUG: soft lockup - CPU#3 stuck for 27s! [a.out:6149]\nCPU: 3 PID: 6149 Comm: a.out Kdump: loaded Not tainted 6.2.0+ #30\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.15.0-1 04/01/2014\nRIP: 0010:remove_wait_queue+0xb/0xc0\nCode: 5e 41 5f c3 cc cc cc cc 0f 1f 80 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 0f 1f 44 00 00 41 57 \u003c41\u003e 56 41 55 41 54 55 48 89 fd 53 48 89 f3 4c 8d 6b 18 4c 8d 73 20\nRSP: 0018:ffff88811b5978b8 EFLAGS: 00000246\nRAX: 0000000000000000 RBX: ffff88811a7d3780 RCX: ffffffffb7a4d768\nRDX: dffffc0000000000 RSI: ffff88811b597908 RDI: ffff888115408040\nRBP: 1ffff110236b2f1b R08: 0000000000000000 R09: ffff88811a7d37e7\nR10: ffffed10234fa6fc R11: 0000000000000001 R12: ffff88811179b800\nR13: 0000000000000001 R14: ffff88811a7d38a8 R15: ffff88811a7d37e0\nFS: 00007f6fb5398740(0000) GS:ffff888237180000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000000020000000 CR3: 000000010b6ba002 CR4: 0000000000370ee0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n \u003cTASK\u003e\n tcp_msg_wait_data+0x279/0x2f0\n tcp_bpf_recvmsg_parser+0x3c6/0x490\n inet_recvmsg+0x280/0x290\n sock_recvmsg+0xfc/0x120\n ____sys_recvmsg+0x160/0x3d0\n ___sys_recvmsg+0xf0/0x180\n __sys_recvmsg+0xea/0x1a0\n do_syscall_64+0x3f/0x90\n entry_SYSCALL_64_after_hwframe+0x72/0xdc\n\nThe logic in tcp_bpf_recvmsg_parser is as follows:\n\nmsg_bytes_ready:\n\tcopied = sk_msg_recvmsg(sk, psock, msg, len, flags);\n\tif (!copied) {\n\t\twait data;\n\t\tgoto msg_bytes_ready;\n\t}\n\nIn this case, \"copied\" always is 0, the infinite loop occurs.\n\nAccording to the Linux system call man page, 0 should be returned in this\ncase. Therefore, in tcp_bpf_recvmsg_parser(), if the length is 0, directly\nreturn. Also modify several other functions with the same problem.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-53133", "url": "https://www.suse.com/security/cve/CVE-2023-53133" }, { "category": "external", "summary": "SUSE Bug 1242423 for CVE-2023-53133", "url": "https://bugzilla.suse.com/1242423" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2023-53133" }, { "cve": "CVE-2023-53145", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-53145" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: btsdio: fix use after free bug in btsdio_remove due to race condition\n\nIn btsdio_probe, the data-\u003ework is bound with btsdio_work. It will be\nstarted in btsdio_send_frame.\n\nIf the btsdio_remove runs with a unfinished work, there may be a race\ncondition that hdev is freed but used in btsdio_work. Fix it by\ncanceling the work before do cleanup in btsdio_remove.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-53145", "url": "https://www.suse.com/security/cve/CVE-2023-53145" }, { "category": "external", "summary": "SUSE Bug 1243047 for CVE-2023-53145", "url": "https://bugzilla.suse.com/1243047" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "important" } ], "title": "CVE-2023-53145" }, { "cve": "CVE-2024-26586", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-26586" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmlxsw: spectrum_acl_tcam: Fix stack corruption\n\nWhen tc filters are first added to a net device, the corresponding local\nport gets bound to an ACL group in the device. The group contains a list\nof ACLs. In turn, each ACL points to a different TCAM region where the\nfilters are stored. During forwarding, the ACLs are sequentially\nevaluated until a match is found.\n\nOne reason to place filters in different regions is when they are added\nwith decreasing priorities and in an alternating order so that two\nconsecutive filters can never fit in the same region because of their\nkey usage.\n\nIn Spectrum-2 and newer ASICs the firmware started to report that the\nmaximum number of ACLs in a group is more than 16, but the layout of the\nregister that configures ACL groups (PAGT) was not updated to account\nfor that. It is therefore possible to hit stack corruption [1] in the\nrare case where more than 16 ACLs in a group are required.\n\nFix by limiting the maximum ACL group size to the minimum between what\nthe firmware reports and the maximum ACLs that fit in the PAGT register.\n\nAdd a test case to make sure the machine does not crash when this\ncondition is hit.\n\n[1]\nKernel panic - not syncing: stack-protector: Kernel stack is corrupted in: mlxsw_sp_acl_tcam_group_update+0x116/0x120\n[...]\n dump_stack_lvl+0x36/0x50\n panic+0x305/0x330\n __stack_chk_fail+0x15/0x20\n mlxsw_sp_acl_tcam_group_update+0x116/0x120\n mlxsw_sp_acl_tcam_group_region_attach+0x69/0x110\n mlxsw_sp_acl_tcam_vchunk_get+0x492/0xa20\n mlxsw_sp_acl_tcam_ventry_add+0x25/0xe0\n mlxsw_sp_acl_rule_add+0x47/0x240\n mlxsw_sp_flower_replace+0x1a9/0x1d0\n tc_setup_cb_add+0xdc/0x1c0\n fl_hw_replace_filter+0x146/0x1f0\n fl_change+0xc17/0x1360\n tc_new_tfilter+0x472/0xb90\n rtnetlink_rcv_msg+0x313/0x3b0\n netlink_rcv_skb+0x58/0x100\n netlink_unicast+0x244/0x390\n netlink_sendmsg+0x1e4/0x440\n ____sys_sendmsg+0x164/0x260\n ___sys_sendmsg+0x9a/0xe0\n __sys_sendmsg+0x7a/0xc0\n do_syscall_64+0x40/0xe0\n entry_SYSCALL_64_after_hwframe+0x63/0x6b", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-26586", "url": "https://www.suse.com/security/cve/CVE-2024-26586" }, { "category": "external", "summary": "SUSE Bug 1220243 for CVE-2024-26586", "url": "https://bugzilla.suse.com/1220243" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2024-26586" }, { "cve": "CVE-2024-26825", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-26825" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfc: nci: free rx_data_reassembly skb on NCI device cleanup\n\nrx_data_reassembly skb is stored during NCI data exchange for processing\nfragmented packets. It is dropped only when the last fragment is processed\nor when an NTF packet with NCI_OP_RF_DEACTIVATE_NTF opcode is received.\nHowever, the NCI device may be deallocated before that which leads to skb\nleak.\n\nAs by design the rx_data_reassembly skb is bound to the NCI device and\nnothing prevents the device to be freed before the skb is processed in\nsome way and cleaned, free it on the NCI device cleanup.\n\nFound by Linux Verification Center (linuxtesting.org) with Syzkaller.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-26825", "url": "https://www.suse.com/security/cve/CVE-2024-26825" }, { "category": "external", "summary": "SUSE Bug 1223065 for CVE-2024-26825", "url": "https://bugzilla.suse.com/1223065" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2024-26825" }, { "cve": "CVE-2024-26872", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-26872" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/srpt: Do not register event handler until srpt device is fully setup\n\nUpon rare occasions, KASAN reports a use-after-free Write\nin srpt_refresh_port().\n\nThis seems to be because an event handler is registered before the\nsrpt device is fully setup and a race condition upon error may leave a\npartially setup event handler in place.\n\nInstead, only register the event handler after srpt device initialization\nis complete.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-26872", "url": "https://www.suse.com/security/cve/CVE-2024-26872" }, { "category": "external", "summary": "SUSE Bug 1223115 for CVE-2024-26872", "url": "https://bugzilla.suse.com/1223115" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2024-26872" }, { "cve": "CVE-2024-26875", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-26875" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: pvrusb2: fix uaf in pvr2_context_set_notify\n\n[Syzbot reported]\nBUG: KASAN: slab-use-after-free in pvr2_context_set_notify+0x2c4/0x310 drivers/media/usb/pvrusb2/pvrusb2-context.c:35\nRead of size 4 at addr ffff888113aeb0d8 by task kworker/1:1/26\n\nCPU: 1 PID: 26 Comm: kworker/1:1 Not tainted 6.8.0-rc1-syzkaller-00046-gf1a27f081c1f #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024\nWorkqueue: usb_hub_wq hub_event\nCall Trace:\n \u003cTASK\u003e\n __dump_stack lib/dump_stack.c:88 [inline]\n dump_stack_lvl+0xd9/0x1b0 lib/dump_stack.c:106\n print_address_description mm/kasan/report.c:377 [inline]\n print_report+0xc4/0x620 mm/kasan/report.c:488\n kasan_report+0xda/0x110 mm/kasan/report.c:601\n pvr2_context_set_notify+0x2c4/0x310 drivers/media/usb/pvrusb2/pvrusb2-context.c:35\n pvr2_context_notify drivers/media/usb/pvrusb2/pvrusb2-context.c:95 [inline]\n pvr2_context_disconnect+0x94/0xb0 drivers/media/usb/pvrusb2/pvrusb2-context.c:272\n\nFreed by task 906:\nkasan_save_stack+0x33/0x50 mm/kasan/common.c:47\nkasan_save_track+0x14/0x30 mm/kasan/common.c:68\nkasan_save_free_info+0x3f/0x60 mm/kasan/generic.c:640\npoison_slab_object mm/kasan/common.c:241 [inline]\n__kasan_slab_free+0x106/0x1b0 mm/kasan/common.c:257\nkasan_slab_free include/linux/kasan.h:184 [inline]\nslab_free_hook mm/slub.c:2121 [inline]\nslab_free mm/slub.c:4299 [inline]\nkfree+0x105/0x340 mm/slub.c:4409\npvr2_context_check drivers/media/usb/pvrusb2/pvrusb2-context.c:137 [inline]\npvr2_context_thread_func+0x69d/0x960 drivers/media/usb/pvrusb2/pvrusb2-context.c:158\n\n[Analyze]\nTask A set disconnect_flag = !0, which resulted in Task B\u0027s condition being met\nand releasing mp, leading to this issue.\n\n[Fix]\nPlace the disconnect_flag assignment operation after all code in pvr2_context_disconnect()\nto avoid this issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-26875", "url": "https://www.suse.com/security/cve/CVE-2024-26875" }, { "category": "external", "summary": "SUSE Bug 1223118 for CVE-2024-26875", "url": "https://bugzilla.suse.com/1223118" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2024-26875" }, { "cve": "CVE-2024-35790", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-35790" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: typec: altmodes/displayport: create sysfs nodes as driver\u0027s default device attribute group\n\nThe DisplayPort driver\u0027s sysfs nodes may be present to the userspace before\ntypec_altmode_set_drvdata() completes in dp_altmode_probe. This means that\na sysfs read can trigger a NULL pointer error by deferencing dp-\u003ehpd in\nhpd_show or dp-\u003elock in pin_assignment_show, as dev_get_drvdata() returns\nNULL in those cases.\n\nRemove manual sysfs node creation in favor of adding attribute group as\ndefault for devices bound to the driver. The ATTRIBUTE_GROUPS() macro is\nnot used here otherwise the path to the sysfs nodes is no longer compliant\nwith the ABI.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-35790", "url": "https://www.suse.com/security/cve/CVE-2024-35790" }, { "category": "external", "summary": "SUSE Bug 1224712 for CVE-2024-35790", "url": "https://bugzilla.suse.com/1224712" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2024-35790" }, { "cve": "CVE-2024-35839", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-35839" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: bridge: replace physindev with physinif in nf_bridge_info\n\nAn skb can be added to a neigh-\u003earp_queue while waiting for an arp\nreply. Where original skb\u0027s skb-\u003edev can be different to neigh\u0027s\nneigh-\u003edev. For instance in case of bridging dnated skb from one veth to\nanother, the skb would be added to a neigh-\u003earp_queue of the bridge.\n\nAs skb-\u003edev can be reset back to nf_bridge-\u003ephysindev and used, and as\nthere is no explicit mechanism that prevents this physindev from been\nfreed under us (for instance neigh_flush_dev doesn\u0027t cleanup skbs from\ndifferent device\u0027s neigh queue) we can crash on e.g. this stack:\n\narp_process\n neigh_update\n skb = __skb_dequeue(\u0026neigh-\u003earp_queue)\n neigh_resolve_output(..., skb)\n ...\n br_nf_dev_xmit\n br_nf_pre_routing_finish_bridge_slow\n skb-\u003edev = nf_bridge-\u003ephysindev\n br_handle_frame_finish\n\nLet\u0027s use plain ifindex instead of net_device link. To peek into the\noriginal net_device we will use dev_get_by_index_rcu(). Thus either we\nget device and are safe to use it or we don\u0027t get it and drop skb.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-35839", "url": "https://www.suse.com/security/cve/CVE-2024-35839" }, { "category": "external", "summary": "SUSE Bug 1224726 for CVE-2024-35839", "url": "https://bugzilla.suse.com/1224726" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2024-35839" }, { "cve": "CVE-2024-36959", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-36959" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\npinctrl: devicetree: fix refcount leak in pinctrl_dt_to_map()\n\nIf we fail to allocate propname buffer, we need to drop the reference\ncount we just took. Because the pinctrl_dt_free_maps() includes the\ndroping operation, here we call it directly.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-36959", "url": "https://www.suse.com/security/cve/CVE-2024-36959" }, { "category": "external", "summary": "SUSE Bug 1225839 for CVE-2024-36959", "url": "https://bugzilla.suse.com/1225839" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2024-36959" }, { "cve": "CVE-2024-38588", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-38588" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nftrace: Fix possible use-after-free issue in ftrace_location()\n\nKASAN reports a bug:\n\n BUG: KASAN: use-after-free in ftrace_location+0x90/0x120\n Read of size 8 at addr ffff888141d40010 by task insmod/424\n CPU: 8 PID: 424 Comm: insmod Tainted: G W 6.9.0-rc2+\n [...]\n Call Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x68/0xa0\n print_report+0xcf/0x610\n kasan_report+0xb5/0xe0\n ftrace_location+0x90/0x120\n register_kprobe+0x14b/0xa40\n kprobe_init+0x2d/0xff0 [kprobe_example]\n do_one_initcall+0x8f/0x2d0\n do_init_module+0x13a/0x3c0\n load_module+0x3082/0x33d0\n init_module_from_file+0xd2/0x130\n __x64_sys_finit_module+0x306/0x440\n do_syscall_64+0x68/0x140\n entry_SYSCALL_64_after_hwframe+0x71/0x79\n\nThe root cause is that, in lookup_rec(), ftrace record of some address\nis being searched in ftrace pages of some module, but those ftrace pages\nat the same time is being freed in ftrace_release_mod() as the\ncorresponding module is being deleted:\n\n CPU1 | CPU2\n register_kprobes() { | delete_module() {\n check_kprobe_address_safe() { |\n arch_check_ftrace_location() { |\n ftrace_location() { |\n lookup_rec() // USE! | ftrace_release_mod() // Free!\n\nTo fix this issue:\n 1. Hold rcu lock as accessing ftrace pages in ftrace_location_range();\n 2. Use ftrace_location_range() instead of lookup_rec() in\n ftrace_location();\n 3. Call synchronize_rcu() before freeing any ftrace pages both in\n ftrace_process_locs()/ftrace_release_mod()/ftrace_free_mem().", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-38588", "url": "https://www.suse.com/security/cve/CVE-2024-38588" }, { "category": "external", "summary": "SUSE Bug 1226837 for CVE-2024-38588", "url": "https://bugzilla.suse.com/1226837" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2024-38588" }, { "cve": "CVE-2024-57982", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-57982" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nxfrm: state: fix out-of-bounds read during lookup\n\nlookup and resize can run in parallel.\n\nThe xfrm_state_hash_generation seqlock ensures a retry, but the hash\nfunctions can observe a hmask value that is too large for the new hlist\narray.\n\nrehash does:\n rcu_assign_pointer(net-\u003exfrm.state_bydst, ndst) [..]\n net-\u003exfrm.state_hmask = nhashmask;\n\nWhile state lookup does:\n h = xfrm_dst_hash(net, daddr, saddr, tmpl-\u003ereqid, encap_family);\n hlist_for_each_entry_rcu(x, net-\u003exfrm.state_bydst + h, bydst) {\n\nThis is only safe in case the update to state_bydst is larger than\nnet-\u003exfrm.xfrm_state_hmask (or if the lookup function gets\nserialized via state spinlock again).\n\nFix this by prefetching state_hmask and the associated pointers.\nThe xfrm_state_hash_generation seqlock retry will ensure that the pointer\nand the hmask will be consistent.\n\nThe existing helpers, like xfrm_dst_hash(), are now unsafe for RCU side,\nadd lockdep assertions to document that they are only safe for insert\nside.\n\nxfrm_state_lookup_byaddr() uses the spinlock rather than RCU.\nAFAICS this is an oversight from back when state lookup was converted to\nRCU, this lock should be replaced with RCU in a future patch.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-57982", "url": "https://www.suse.com/security/cve/CVE-2024-57982" }, { "category": "external", "summary": "SUSE Bug 1237913 for CVE-2024-57982", "url": "https://bugzilla.suse.com/1237913" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2024-57982" }, { "cve": "CVE-2025-21898", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-21898" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nftrace: Avoid potential division by zero in function_stat_show()\n\nCheck whether denominator expression x * (x - 1) * 1000 mod {2^32, 2^64}\nproduce zero and skip stddev computation in that case.\n\nFor now don\u0027t care about rec-\u003ecounter * rec-\u003ecounter overflow because\nrec-\u003etime * rec-\u003etime overflow will likely happen earlier.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-21898", "url": "https://www.suse.com/security/cve/CVE-2025-21898" }, { "category": "external", "summary": "SUSE Bug 1240610 for CVE-2025-21898", "url": "https://bugzilla.suse.com/1240610" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2025-21898" }, { "cve": "CVE-2025-21920", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-21920" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvlan: enforce underlying device type\n\nCurrently, VLAN devices can be created on top of non-ethernet devices.\n\nBesides the fact that it doesn\u0027t make much sense, this also causes a\nbug which leaks the address of a kernel function to usermode.\n\nWhen creating a VLAN device, we initialize GARP (garp_init_applicant)\nand MRP (mrp_init_applicant) for the underlying device.\n\nAs part of the initialization process, we add the multicast address of\neach applicant to the underlying device, by calling dev_mc_add.\n\n__dev_mc_add uses dev-\u003eaddr_len to determine the length of the new\nmulticast address.\n\nThis causes an out-of-bounds read if dev-\u003eaddr_len is greater than 6,\nsince the multicast addresses provided by GARP and MRP are only 6\nbytes long.\n\nThis behaviour can be reproduced using the following commands:\n\nip tunnel add gretest mode ip6gre local ::1 remote ::2 dev lo\nip l set up dev gretest\nip link add link gretest name vlantest type vlan id 100\n\nThen, the following command will display the address of garp_pdu_rcv:\n\nip maddr show | grep 01:80:c2:00:00:21\n\nFix the bug by enforcing the type of the underlying device during VLAN\ndevice initialization.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-21920", "url": "https://www.suse.com/security/cve/CVE-2025-21920" }, { "category": "external", "summary": "SUSE Bug 1240686 for CVE-2025-21920", "url": "https://bugzilla.suse.com/1240686" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2025-21920" }, { "cve": "CVE-2025-21971", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-21971" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet_sched: Prevent creation of classes with TC_H_ROOT\n\nThe function qdisc_tree_reduce_backlog() uses TC_H_ROOT as a termination\ncondition when traversing up the qdisc tree to update parent backlog\ncounters. However, if a class is created with classid TC_H_ROOT, the\ntraversal terminates prematurely at this class instead of reaching the\nactual root qdisc, causing parent statistics to be incorrectly maintained.\nIn case of DRR, this could lead to a crash as reported by Mingi Cho.\n\nPrevent the creation of any Qdisc class with classid TC_H_ROOT\n(0xFFFFFFFF) across all qdisc types, as suggested by Jamal.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-21971", "url": "https://www.suse.com/security/cve/CVE-2025-21971" }, { "category": "external", "summary": "SUSE Bug 1240799 for CVE-2025-21971", "url": "https://bugzilla.suse.com/1240799" }, { "category": "external", "summary": "SUSE Bug 1245794 for CVE-2025-21971", "url": "https://bugzilla.suse.com/1245794" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "important" } ], "title": "CVE-2025-21971" }, { "cve": "CVE-2025-22035", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-22035" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntracing: Fix use-after-free in print_graph_function_flags during tracer switching\n\nKairui reported a UAF issue in print_graph_function_flags() during\nftrace stress testing [1]. This issue can be reproduced if puting a\n\u0027mdelay(10)\u0027 after \u0027mutex_unlock(\u0026trace_types_lock)\u0027 in s_start(),\nand executing the following script:\n\n $ echo function_graph \u003e current_tracer\n $ cat trace \u003e /dev/null \u0026\n $ sleep 5 # Ensure the \u0027cat\u0027 reaches the \u0027mdelay(10)\u0027 point\n $ echo timerlat \u003e current_tracer\n\nThe root cause lies in the two calls to print_graph_function_flags\nwithin print_trace_line during each s_show():\n\n * One through \u0027iter-\u003etrace-\u003eprint_line()\u0027;\n * Another through \u0027event-\u003efuncs-\u003etrace()\u0027, which is hidden in\n print_trace_fmt() before print_trace_line returns.\n\nTracer switching only updates the former, while the latter continues\nto use the print_line function of the old tracer, which in the script\nabove is print_graph_function_flags.\n\nMoreover, when switching from the \u0027function_graph\u0027 tracer to the\n\u0027timerlat\u0027 tracer, s_start only calls graph_trace_close of the\n\u0027function_graph\u0027 tracer to free \u0027iter-\u003eprivate\u0027, but does not set\nit to NULL. This provides an opportunity for \u0027event-\u003efuncs-\u003etrace()\u0027\nto use an invalid \u0027iter-\u003eprivate\u0027.\n\nTo fix this issue, set \u0027iter-\u003eprivate\u0027 to NULL immediately after\nfreeing it in graph_trace_close(), ensuring that an invalid pointer\nis not passed to other tracers. Additionally, clean up the unnecessary\n\u0027iter-\u003eprivate = NULL\u0027 during each \u0027cat trace\u0027 when using wakeup and\nirqsoff tracers.\n\n [1] https://lore.kernel.org/all/20231112150030.84609-1-ryncsn@gmail.com/", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-22035", "url": "https://www.suse.com/security/cve/CVE-2025-22035" }, { "category": "external", "summary": "SUSE Bug 1241544 for CVE-2025-22035", "url": "https://bugzilla.suse.com/1241544" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2025-22035" }, { "cve": "CVE-2025-23149", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-23149" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntpm: do not start chip while suspended\n\nChecking TPM_CHIP_FLAG_SUSPENDED after the call to tpm_find_get_ops() can\nlead to a spurious tpm_chip_start() call:\n\n[35985.503771] i2c i2c-1: Transfer while suspended\n[35985.503796] WARNING: CPU: 0 PID: 74 at drivers/i2c/i2c-core.h:56 __i2c_transfer+0xbe/0x810\n[35985.503802] Modules linked in:\n[35985.503808] CPU: 0 UID: 0 PID: 74 Comm: hwrng Tainted: G W 6.13.0-next-20250203-00005-gfa0cb5642941 #19 9c3d7f78192f2d38e32010ac9c90fdc71109ef6f\n[35985.503814] Tainted: [W]=WARN\n[35985.503817] Hardware name: Google Morphius/Morphius, BIOS Google_Morphius.13434.858.0 10/26/2023\n[35985.503819] RIP: 0010:__i2c_transfer+0xbe/0x810\n[35985.503825] Code: 30 01 00 00 4c 89 f7 e8 40 fe d8 ff 48 8b 93 80 01 00 00 48 85 d2 75 03 49 8b 16 48 c7 c7 0a fb 7c a7 48 89 c6 e8 32 ad b0 fe \u003c0f\u003e 0b b8 94 ff ff ff e9 33 04 00 00 be 02 00 00 00 83 fd 02 0f 5\n[35985.503828] RSP: 0018:ffffa106c0333d30 EFLAGS: 00010246\n[35985.503833] RAX: 074ba64aa20f7000 RBX: ffff8aa4c1167120 RCX: 0000000000000000\n[35985.503836] RDX: 0000000000000000 RSI: ffffffffa77ab0e4 RDI: 0000000000000001\n[35985.503838] RBP: 0000000000000001 R08: 0000000000000001 R09: 0000000000000000\n[35985.503841] R10: 0000000000000004 R11: 00000001000313d5 R12: ffff8aa4c10f1820\n[35985.503843] R13: ffff8aa4c0e243c0 R14: ffff8aa4c1167250 R15: ffff8aa4c1167120\n[35985.503846] FS: 0000000000000000(0000) GS:ffff8aa4eae00000(0000) knlGS:0000000000000000\n[35985.503849] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[35985.503852] CR2: 00007fab0aaf1000 CR3: 0000000105328000 CR4: 00000000003506f0\n[35985.503855] Call Trace:\n[35985.503859] \u003cTASK\u003e\n[35985.503863] ? __warn+0xd4/0x260\n[35985.503868] ? __i2c_transfer+0xbe/0x810\n[35985.503874] ? report_bug+0xf3/0x210\n[35985.503882] ? handle_bug+0x63/0xb0\n[35985.503887] ? exc_invalid_op+0x16/0x50\n[35985.503892] ? asm_exc_invalid_op+0x16/0x20\n[35985.503904] ? __i2c_transfer+0xbe/0x810\n[35985.503913] tpm_cr50_i2c_transfer_message+0x24/0xf0\n[35985.503920] tpm_cr50_i2c_read+0x8e/0x120\n[35985.503928] tpm_cr50_request_locality+0x75/0x170\n[35985.503935] tpm_chip_start+0x116/0x160\n[35985.503942] tpm_try_get_ops+0x57/0x90\n[35985.503948] tpm_find_get_ops+0x26/0xd0\n[35985.503955] tpm_get_random+0x2d/0x80\n\nDon\u0027t move forward with tpm_chip_start() inside tpm_try_get_ops(), unless\nTPM_CHIP_FLAG_SUSPENDED is not set. tpm_find_get_ops() will return NULL in\nsuch a failure case.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-23149", "url": "https://www.suse.com/security/cve/CVE-2025-23149" }, { "category": "external", "summary": "SUSE Bug 1242758 for CVE-2025-23149", "url": "https://bugzilla.suse.com/1242758" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2025-23149" }, { "cve": "CVE-2025-37756", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-37756" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: tls: explicitly disallow disconnect\n\nsyzbot discovered that it can disconnect a TLS socket and then\nrun into all sort of unexpected corner cases. I have a vague\nrecollection of Eric pointing this out to us a long time ago.\nSupporting disconnect is really hard, for one thing if offload\nis enabled we\u0027d need to wait for all packets to be _acked_.\nDisconnect is not commonly used, disallow it.\n\nThe immediate problem syzbot run into is the warning in the strp,\nbut that\u0027s just the easiest bug to trigger:\n\n WARNING: CPU: 0 PID: 5834 at net/tls/tls_strp.c:486 tls_strp_msg_load+0x72e/0xa80 net/tls/tls_strp.c:486\n RIP: 0010:tls_strp_msg_load+0x72e/0xa80 net/tls/tls_strp.c:486\n Call Trace:\n \u003cTASK\u003e\n tls_rx_rec_wait+0x280/0xa60 net/tls/tls_sw.c:1363\n tls_sw_recvmsg+0x85c/0x1c30 net/tls/tls_sw.c:2043\n inet6_recvmsg+0x2c9/0x730 net/ipv6/af_inet6.c:678\n sock_recvmsg_nosec net/socket.c:1023 [inline]\n sock_recvmsg+0x109/0x280 net/socket.c:1045\n __sys_recvfrom+0x202/0x380 net/socket.c:2237", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-37756", "url": "https://www.suse.com/security/cve/CVE-2025-37756" }, { "category": "external", "summary": "SUSE Bug 1242515 for CVE-2025-37756", "url": "https://bugzilla.suse.com/1242515" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2025-37756" }, { "cve": "CVE-2025-37757", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-37757" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntipc: fix memory leak in tipc_link_xmit\n\nIn case the backlog transmit queue for system-importance messages is overloaded,\ntipc_link_xmit() returns -ENOBUFS but the skb list is not purged. This leads to\nmemory leak and failure when a skb is allocated.\n\nThis commit fixes this issue by purging the skb list before tipc_link_xmit()\nreturns.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-37757", "url": "https://www.suse.com/security/cve/CVE-2025-37757" }, { "category": "external", "summary": "SUSE Bug 1242521 for CVE-2025-37757", "url": "https://bugzilla.suse.com/1242521" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2025-37757" }, { "cve": "CVE-2025-37781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-37781" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ni2c: cros-ec-tunnel: defer probe if parent EC is not present\n\nWhen i2c-cros-ec-tunnel and the EC driver are built-in, the EC parent\ndevice will not be found, leading to NULL pointer dereference.\n\nThat can also be reproduced by unbinding the controller driver and then\nloading i2c-cros-ec-tunnel module (or binding the device).\n\n[ 271.991245] BUG: kernel NULL pointer dereference, address: 0000000000000058\n[ 271.998215] #PF: supervisor read access in kernel mode\n[ 272.003351] #PF: error_code(0x0000) - not-present page\n[ 272.008485] PGD 0 P4D 0\n[ 272.011022] Oops: Oops: 0000 [#1] SMP NOPTI\n[ 272.015207] CPU: 0 UID: 0 PID: 3859 Comm: insmod Tainted: G S 6.15.0-rc1-00004-g44722359ed83 #30 PREEMPT(full) 3c7fb39a552e7d949de2ad921a7d6588d3a4fdc5\n[ 272.030312] Tainted: [S]=CPU_OUT_OF_SPEC\n[ 272.034233] Hardware name: HP Berknip/Berknip, BIOS Google_Berknip.13434.356.0 05/17/2021\n[ 272.042400] RIP: 0010:ec_i2c_probe+0x2b/0x1c0 [i2c_cros_ec_tunnel]\n[ 272.048577] Code: 1f 44 00 00 41 57 41 56 41 55 41 54 53 48 83 ec 10 65 48 8b 05 06 a0 6c e7 48 89 44 24 08 4c 8d 7f 10 48 8b 47 50 4c 8b 60 78 \u003c49\u003e 83 7c 24 58 00 0f 84 2f 01 00 00 48 89 fb be 30 06 00 00 4c 9\n[ 272.067317] RSP: 0018:ffffa32082a03940 EFLAGS: 00010282\n[ 272.072541] RAX: ffff969580b6a810 RBX: ffff969580b68c10 RCX: 0000000000000000\n[ 272.079672] RDX: 0000000000000000 RSI: 0000000000000282 RDI: ffff969580b68c00\n[ 272.086804] RBP: 00000000fffffdfb R08: 0000000000000000 R09: 0000000000000000\n[ 272.093936] R10: 0000000000000000 R11: ffffffffc0600000 R12: 0000000000000000\n[ 272.101067] R13: ffffffffa666fbb8 R14: ffffffffc05b5528 R15: ffff969580b68c10\n[ 272.108198] FS: 00007b930906fc40(0000) GS:ffff969603149000(0000) knlGS:0000000000000000\n[ 272.116282] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 272.122024] CR2: 0000000000000058 CR3: 000000012631c000 CR4: 00000000003506f0\n[ 272.129155] Call Trace:\n[ 272.131606] \u003cTASK\u003e\n[ 272.133709] ? acpi_dev_pm_attach+0xdd/0x110\n[ 272.137985] platform_probe+0x69/0xa0\n[ 272.141652] really_probe+0x152/0x310\n[ 272.145318] __driver_probe_device+0x77/0x110\n[ 272.149678] driver_probe_device+0x1e/0x190\n[ 272.153864] __driver_attach+0x10b/0x1e0\n[ 272.157790] ? driver_attach+0x20/0x20\n[ 272.161542] bus_for_each_dev+0x107/0x150\n[ 272.165553] bus_add_driver+0x15d/0x270\n[ 272.169392] driver_register+0x65/0x110\n[ 272.173232] ? cleanup_module+0xa80/0xa80 [i2c_cros_ec_tunnel 3a00532f3f4af4a9eade753f86b0f8dd4e4e5698]\n[ 272.182617] do_one_initcall+0x110/0x350\n[ 272.186543] ? security_kernfs_init_security+0x49/0xd0\n[ 272.191682] ? __kernfs_new_node+0x1b9/0x240\n[ 272.195954] ? security_kernfs_init_security+0x49/0xd0\n[ 272.201093] ? __kernfs_new_node+0x1b9/0x240\n[ 272.205365] ? kernfs_link_sibling+0x105/0x130\n[ 272.209810] ? kernfs_next_descendant_post+0x1c/0xa0\n[ 272.214773] ? kernfs_activate+0x57/0x70\n[ 272.218699] ? kernfs_add_one+0x118/0x160\n[ 272.222710] ? __kernfs_create_file+0x71/0xa0\n[ 272.227069] ? sysfs_add_bin_file_mode_ns+0xd6/0x110\n[ 272.232033] ? internal_create_group+0x453/0x4a0\n[ 272.236651] ? __vunmap_range_noflush+0x214/0x2d0\n[ 272.241355] ? __free_frozen_pages+0x1dc/0x420\n[ 272.245799] ? free_vmap_area_noflush+0x10a/0x1c0\n[ 272.250505] ? load_module+0x1509/0x16f0\n[ 272.254431] do_init_module+0x60/0x230\n[ 272.258181] __se_sys_finit_module+0x27a/0x370\n[ 272.262627] do_syscall_64+0x6a/0xf0\n[ 272.266206] ? do_syscall_64+0x76/0xf0\n[ 272.269956] ? irqentry_exit_to_user_mode+0x79/0x90\n[ 272.274836] entry_SYSCALL_64_after_hwframe+0x55/0x5d\n[ 272.279887] RIP: 0033:0x7b9309168d39\n[ 272.283466] Code: 5b 41 5c 5d c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 8b 0d af 40 0c 00 f7 d8 64 89 01 8\n[ 272.302210] RSP: 002b:00007fff50f1a288 EFLAGS: 00000246 ORIG_RAX: 000\n---truncated---", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-37781", "url": "https://www.suse.com/security/cve/CVE-2025-37781" }, { "category": "external", "summary": "SUSE Bug 1242575 for CVE-2025-37781", "url": "https://bugzilla.suse.com/1242575" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2025-37781" }, { "cve": "CVE-2025-37800", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-37800" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndriver core: fix potential NULL pointer dereference in dev_uevent()\n\nIf userspace reads \"uevent\" device attribute at the same time as another\nthreads unbinds the device from its driver, change to dev-\u003edriver from a\nvalid pointer to NULL may result in crash. Fix this by using READ_ONCE()\nwhen fetching the pointer, and take bus\u0027 drivers klist lock to make sure\ndriver instance will not disappear while we access it.\n\nUse WRITE_ONCE() when setting the driver pointer to ensure there is no\ntearing.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-37800", "url": "https://www.suse.com/security/cve/CVE-2025-37800" }, { "category": "external", "summary": "SUSE Bug 1242849 for CVE-2025-37800", "url": "https://bugzilla.suse.com/1242849" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2025-37800" }, { "cve": "CVE-2025-37810", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-37810" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: dwc3: gadget: check that event count does not exceed event buffer length\n\nThe event count is read from register DWC3_GEVNTCOUNT.\nThere is a check for the count being zero, but not for exceeding the\nevent buffer length.\nCheck that event count does not exceed event buffer length,\navoiding an out-of-bounds access when memcpy\u0027ing the event.\nCrash log:\nUnable to handle kernel paging request at virtual address ffffffc0129be000\npc : __memcpy+0x114/0x180\nlr : dwc3_check_event_buf+0xec/0x348\nx3 : 0000000000000030 x2 : 000000000000dfc4\nx1 : ffffffc0129be000 x0 : ffffff87aad60080\nCall trace:\n__memcpy+0x114/0x180\ndwc3_interrupt+0x24/0x34", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-37810", "url": "https://www.suse.com/security/cve/CVE-2025-37810" }, { "category": "external", "summary": "SUSE Bug 1242906 for CVE-2025-37810", "url": "https://bugzilla.suse.com/1242906" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2025-37810" }, { "cve": "CVE-2025-37836", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-37836" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nPCI: Fix reference leak in pci_register_host_bridge()\n\nIf device_register() fails, call put_device() to give up the reference to\navoid a memory leak, per the comment at device_register().\n\nFound by code review.\n\n[bhelgaas: squash Dan Carpenter\u0027s double free fix from\nhttps://lore.kernel.org/r/db806a6c-a91b-4e5a-a84b-6b7e01bdac85@stanley.mountain]", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-37836", "url": "https://www.suse.com/security/cve/CVE-2025-37836" }, { "category": "external", "summary": "SUSE Bug 1242957 for CVE-2025-37836", "url": "https://bugzilla.suse.com/1242957" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2025-37836" }, { "cve": "CVE-2025-37844", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-37844" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncifs: avoid NULL pointer dereference in dbg call\n\ncifs_server_dbg() implies server to be non-NULL so\nmove call under condition to avoid NULL pointer dereference.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-37844", "url": "https://www.suse.com/security/cve/CVE-2025-37844" }, { "category": "external", "summary": "SUSE Bug 1242946 for CVE-2025-37844", "url": "https://bugzilla.suse.com/1242946" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2025-37844" }, { "cve": "CVE-2025-37862", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-37862" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: pidff: Fix null pointer dereference in pidff_find_fields\n\nThis function triggered a null pointer dereference if used to search for\na report that isn\u0027t implemented on the device. This happened both for\noptional and required reports alike.\n\nThe same logic was applied to pidff_find_special_field and although\npidff_init_fields should return an error earlier if one of the required\nreports is missing, future modifications could change this logic and\nresurface this possible null pointer dereference again.\n\nLKML bug report:\nhttps://lore.kernel.org/all/CAL-gK7f5=R0nrrQdPtaZZr1fd-cdAMbDMuZ_NLA8vM0SX+nGSw@mail.gmail.com", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-37862", "url": "https://www.suse.com/security/cve/CVE-2025-37862" }, { "category": "external", "summary": "SUSE Bug 1242982 for CVE-2025-37862", "url": "https://bugzilla.suse.com/1242982" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2025-37862" }, { "cve": "CVE-2025-37892", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-37892" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmtd: inftlcore: Add error check for inftl_read_oob()\n\nIn INFTL_findwriteunit(), the return value of inftl_read_oob()\nneed to be checked. A proper implementation can be\nfound in INFTL_deleteblock(). The status will be set as\nSECTOR_IGNORE to break from the while-loop correctly\nif the inftl_read_oob() fails.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-37892", "url": "https://www.suse.com/security/cve/CVE-2025-37892" }, { "category": "external", "summary": "SUSE Bug 1243536 for CVE-2025-37892", "url": "https://bugzilla.suse.com/1243536" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2025-37892" }, { "cve": "CVE-2025-37911", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-37911" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbnxt_en: Fix out-of-bound memcpy() during ethtool -w\n\nWhen retrieving the FW coredump using ethtool, it can sometimes cause\nmemory corruption:\n\nBUG: KFENCE: memory corruption in __bnxt_get_coredump+0x3ef/0x670 [bnxt_en]\nCorrupted memory at 0x000000008f0f30e8 [ ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ] (in kfence-#45):\n__bnxt_get_coredump+0x3ef/0x670 [bnxt_en]\nethtool_get_dump_data+0xdc/0x1a0\n__dev_ethtool+0xa1e/0x1af0\ndev_ethtool+0xa8/0x170\ndev_ioctl+0x1b5/0x580\nsock_do_ioctl+0xab/0xf0\nsock_ioctl+0x1ce/0x2e0\n__x64_sys_ioctl+0x87/0xc0\ndo_syscall_64+0x5c/0xf0\nentry_SYSCALL_64_after_hwframe+0x78/0x80\n\n...\n\nThis happens when copying the coredump segment list in\nbnxt_hwrm_dbg_dma_data() with the HWRM_DBG_COREDUMP_LIST FW command.\nThe info-\u003edest_buf buffer is allocated based on the number of coredump\nsegments returned by the FW. The segment list is then DMA\u0027ed by\nthe FW and the length of the DMA is returned by FW. The driver then\ncopies this DMA\u0027ed segment list to info-\u003edest_buf.\n\nIn some cases, this DMA length may exceed the info-\u003edest_buf length\nand cause the above BUG condition. Fix it by capping the copy\nlength to not exceed the length of info-\u003edest_buf. The extra\nDMA data contains no useful information.\n\nThis code path is shared for the HWRM_DBG_COREDUMP_LIST and the\nHWRM_DBG_COREDUMP_RETRIEVE FW commands. The buffering is different\nfor these 2 FW commands. To simplify the logic, we need to move\nthe line to adjust the buffer length for HWRM_DBG_COREDUMP_RETRIEVE\nup, so that the new check to cap the copy length will work for both\ncommands.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-37911", "url": "https://www.suse.com/security/cve/CVE-2025-37911" }, { "category": "external", "summary": "SUSE Bug 1243469 for CVE-2025-37911", "url": "https://bugzilla.suse.com/1243469" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 0, "baseSeverity": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2025-37911" }, { "cve": "CVE-2025-37923", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-37923" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntracing: Fix oob write in trace_seq_to_buffer()\n\nsyzbot reported this bug:\n==================================================================\nBUG: KASAN: slab-out-of-bounds in trace_seq_to_buffer kernel/trace/trace.c:1830 [inline]\nBUG: KASAN: slab-out-of-bounds in tracing_splice_read_pipe+0x6be/0xdd0 kernel/trace/trace.c:6822\nWrite of size 4507 at addr ffff888032b6b000 by task syz.2.320/7260\n\nCPU: 1 UID: 0 PID: 7260 Comm: syz.2.320 Not tainted 6.15.0-rc1-syzkaller-00301-g3bde70a2c827 #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025\nCall Trace:\n \u003cTASK\u003e\n __dump_stack lib/dump_stack.c:94 [inline]\n dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:408 [inline]\n print_report+0xc3/0x670 mm/kasan/report.c:521\n kasan_report+0xe0/0x110 mm/kasan/report.c:634\n check_region_inline mm/kasan/generic.c:183 [inline]\n kasan_check_range+0xef/0x1a0 mm/kasan/generic.c:189\n __asan_memcpy+0x3c/0x60 mm/kasan/shadow.c:106\n trace_seq_to_buffer kernel/trace/trace.c:1830 [inline]\n tracing_splice_read_pipe+0x6be/0xdd0 kernel/trace/trace.c:6822\n ....\n==================================================================\n\nIt has been reported that trace_seq_to_buffer() tries to copy more data\nthan PAGE_SIZE to buf. Therefore, to prevent this, we should use the\nsmaller of trace_seq_used(\u0026iter-\u003eseq) and PAGE_SIZE as an argument.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-37923", "url": "https://www.suse.com/security/cve/CVE-2025-37923" }, { "category": "external", "summary": "SUSE Bug 1243551 for CVE-2025-37923", "url": "https://bugzilla.suse.com/1243551" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2025-37923" }, { "cve": "CVE-2025-37927", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-37927" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\niommu/amd: Fix potential buffer overflow in parse_ivrs_acpihid\n\nThere is a string parsing logic error which can lead to an overflow of hid\nor uid buffers. Comparing ACPIID_LEN against a total string length doesn\u0027t\ntake into account the lengths of individual hid and uid buffers so the\ncheck is insufficient in some cases. For example if the length of hid\nstring is 4 and the length of the uid string is 260, the length of str\nwill be equal to ACPIID_LEN + 1 but uid string will overflow uid buffer\nwhich size is 256.\n\nThe same applies to the hid string with length 13 and uid string with\nlength 250.\n\nCheck the length of hid and uid strings separately to prevent\nbuffer overflow.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-37927", "url": "https://www.suse.com/security/cve/CVE-2025-37927" }, { "category": "external", "summary": "SUSE Bug 1243620 for CVE-2025-37927", "url": "https://bugzilla.suse.com/1243620" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2025-37927" }, { "cve": "CVE-2025-37928", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-37928" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm-bufio: don\u0027t schedule in atomic context\n\nA BUG was reported as below when CONFIG_DEBUG_ATOMIC_SLEEP and\ntry_verify_in_tasklet are enabled.\n[ 129.444685][ T934] BUG: sleeping function called from invalid context at drivers/md/dm-bufio.c:2421\n[ 129.444723][ T934] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 934, name: kworker/1:4\n[ 129.444740][ T934] preempt_count: 201, expected: 0\n[ 129.444756][ T934] RCU nest depth: 0, expected: 0\n[ 129.444781][ T934] Preemption disabled at:\n[ 129.444789][ T934] [\u003cffffffd816231900\u003e] shrink_work+0x21c/0x248\n[ 129.445167][ T934] kernel BUG at kernel/sched/walt/walt_debug.c:16!\n[ 129.445183][ T934] Internal error: Oops - BUG: 00000000f2000800 [#1] PREEMPT SMP\n[ 129.445204][ T934] Skip md ftrace buffer dump for: 0x1609e0\n[ 129.447348][ T934] CPU: 1 PID: 934 Comm: kworker/1:4 Tainted: G W OE 6.6.56-android15-8-o-g6f82312b30b9-debug #1 1400000003000000474e5500b3187743670464e8\n[ 129.447362][ T934] Hardware name: Qualcomm Technologies, Inc. Parrot QRD, Alpha-M (DT)\n[ 129.447373][ T934] Workqueue: dm_bufio_cache shrink_work\n[ 129.447394][ T934] pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n[ 129.447406][ T934] pc : android_rvh_schedule_bug+0x0/0x8 [sched_walt_debug]\n[ 129.447435][ T934] lr : __traceiter_android_rvh_schedule_bug+0x44/0x6c\n[ 129.447451][ T934] sp : ffffffc0843dbc90\n[ 129.447459][ T934] x29: ffffffc0843dbc90 x28: ffffffffffffffff x27: 0000000000000c8b\n[ 129.447479][ T934] x26: 0000000000000040 x25: ffffff804b3d6260 x24: ffffffd816232b68\n[ 129.447497][ T934] x23: ffffff805171c5b4 x22: 0000000000000000 x21: ffffffd816231900\n[ 129.447517][ T934] x20: ffffff80306ba898 x19: 0000000000000000 x18: ffffffc084159030\n[ 129.447535][ T934] x17: 00000000d2b5dd1f x16: 00000000d2b5dd1f x15: ffffffd816720358\n[ 129.447554][ T934] x14: 0000000000000004 x13: ffffff89ef978000 x12: 0000000000000003\n[ 129.447572][ T934] x11: ffffffd817a823c4 x10: 0000000000000202 x9 : 7e779c5735de9400\n[ 129.447591][ T934] x8 : ffffffd81560d004 x7 : 205b5d3938373434 x6 : ffffffd8167397c8\n[ 129.447610][ T934] x5 : 0000000000000000 x4 : 0000000000000001 x3 : ffffffc0843db9e0\n[ 129.447629][ T934] x2 : 0000000000002f15 x1 : 0000000000000000 x0 : 0000000000000000\n[ 129.447647][ T934] Call trace:\n[ 129.447655][ T934] android_rvh_schedule_bug+0x0/0x8 [sched_walt_debug 1400000003000000474e550080cce8a8a78606b6]\n[ 129.447681][ T934] __might_resched+0x190/0x1a8\n[ 129.447694][ T934] shrink_work+0x180/0x248\n[ 129.447706][ T934] process_one_work+0x260/0x624\n[ 129.447718][ T934] worker_thread+0x28c/0x454\n[ 129.447729][ T934] kthread+0x118/0x158\n[ 129.447742][ T934] ret_from_fork+0x10/0x20\n[ 129.447761][ T934] Code: ???????? ???????? ???????? d2b5dd1f (d4210000)\n[ 129.447772][ T934] ---[ end trace 0000000000000000 ]---\n\ndm_bufio_lock will call spin_lock_bh when try_verify_in_tasklet\nis enabled, and __scan will be called in atomic context.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-37928", "url": "https://www.suse.com/security/cve/CVE-2025-37928" }, { "category": "external", "summary": "SUSE Bug 1243621 for CVE-2025-37928", "url": "https://bugzilla.suse.com/1243621" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2025-37928" }, { "cve": "CVE-2025-37961", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-37961" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipvs: fix uninit-value for saddr in do_output_route4\n\nsyzbot reports for uninit-value for the saddr argument [1].\ncommit 4754957f04f5 (\"ipvs: do not use random local source address for\ntunnels\") already implies that the input value of saddr\nshould be ignored but the code is still reading it which can prevent\nto connect the route. Fix it by changing the argument to ret_saddr.\n\n[1]\nBUG: KMSAN: uninit-value in do_output_route4+0x42c/0x4d0 net/netfilter/ipvs/ip_vs_xmit.c:147\n do_output_route4+0x42c/0x4d0 net/netfilter/ipvs/ip_vs_xmit.c:147\n __ip_vs_get_out_rt+0x403/0x21d0 net/netfilter/ipvs/ip_vs_xmit.c:330\n ip_vs_tunnel_xmit+0x205/0x2380 net/netfilter/ipvs/ip_vs_xmit.c:1136\n ip_vs_in_hook+0x1aa5/0x35b0 net/netfilter/ipvs/ip_vs_core.c:2063\n nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline]\n nf_hook_slow+0xf7/0x400 net/netfilter/core.c:626\n nf_hook include/linux/netfilter.h:269 [inline]\n __ip_local_out+0x758/0x7e0 net/ipv4/ip_output.c:118\n ip_local_out net/ipv4/ip_output.c:127 [inline]\n ip_send_skb+0x6a/0x3c0 net/ipv4/ip_output.c:1501\n udp_send_skb+0xfda/0x1b70 net/ipv4/udp.c:1195\n udp_sendmsg+0x2fe3/0x33c0 net/ipv4/udp.c:1483\n inet_sendmsg+0x1fc/0x280 net/ipv4/af_inet.c:851\n sock_sendmsg_nosec net/socket.c:712 [inline]\n __sock_sendmsg+0x267/0x380 net/socket.c:727\n ____sys_sendmsg+0x91b/0xda0 net/socket.c:2566\n ___sys_sendmsg+0x28d/0x3c0 net/socket.c:2620\n __sys_sendmmsg+0x41d/0x880 net/socket.c:2702\n __compat_sys_sendmmsg net/compat.c:360 [inline]\n __do_compat_sys_sendmmsg net/compat.c:367 [inline]\n __se_compat_sys_sendmmsg net/compat.c:364 [inline]\n __ia32_compat_sys_sendmmsg+0xc8/0x140 net/compat.c:364\n ia32_sys_call+0x3ffa/0x41f0 arch/x86/include/generated/asm/syscalls_32.h:346\n do_syscall_32_irqs_on arch/x86/entry/syscall_32.c:83 [inline]\n __do_fast_syscall_32+0xb0/0x110 arch/x86/entry/syscall_32.c:306\n do_fast_syscall_32+0x38/0x80 arch/x86/entry/syscall_32.c:331\n do_SYSENTER_32+0x1f/0x30 arch/x86/entry/syscall_32.c:369\n entry_SYSENTER_compat_after_hwframe+0x84/0x8e\n\nUninit was created at:\n slab_post_alloc_hook mm/slub.c:4167 [inline]\n slab_alloc_node mm/slub.c:4210 [inline]\n __kmalloc_cache_noprof+0x8fa/0xe00 mm/slub.c:4367\n kmalloc_noprof include/linux/slab.h:905 [inline]\n ip_vs_dest_dst_alloc net/netfilter/ipvs/ip_vs_xmit.c:61 [inline]\n __ip_vs_get_out_rt+0x35d/0x21d0 net/netfilter/ipvs/ip_vs_xmit.c:323\n ip_vs_tunnel_xmit+0x205/0x2380 net/netfilter/ipvs/ip_vs_xmit.c:1136\n ip_vs_in_hook+0x1aa5/0x35b0 net/netfilter/ipvs/ip_vs_core.c:2063\n nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline]\n nf_hook_slow+0xf7/0x400 net/netfilter/core.c:626\n nf_hook include/linux/netfilter.h:269 [inline]\n __ip_local_out+0x758/0x7e0 net/ipv4/ip_output.c:118\n ip_local_out net/ipv4/ip_output.c:127 [inline]\n ip_send_skb+0x6a/0x3c0 net/ipv4/ip_output.c:1501\n udp_send_skb+0xfda/0x1b70 net/ipv4/udp.c:1195\n udp_sendmsg+0x2fe3/0x33c0 net/ipv4/udp.c:1483\n inet_sendmsg+0x1fc/0x280 net/ipv4/af_inet.c:851\n sock_sendmsg_nosec net/socket.c:712 [inline]\n __sock_sendmsg+0x267/0x380 net/socket.c:727\n ____sys_sendmsg+0x91b/0xda0 net/socket.c:2566\n ___sys_sendmsg+0x28d/0x3c0 net/socket.c:2620\n __sys_sendmmsg+0x41d/0x880 net/socket.c:2702\n __compat_sys_sendmmsg net/compat.c:360 [inline]\n __do_compat_sys_sendmmsg net/compat.c:367 [inline]\n __se_compat_sys_sendmmsg net/compat.c:364 [inline]\n __ia32_compat_sys_sendmmsg+0xc8/0x140 net/compat.c:364\n ia32_sys_call+0x3ffa/0x41f0 arch/x86/include/generated/asm/syscalls_32.h:346\n do_syscall_32_irqs_on arch/x86/entry/syscall_32.c:83 [inline]\n __do_fast_syscall_32+0xb0/0x110 arch/x86/entry/syscall_32.c:306\n do_fast_syscall_32+0x38/0x80 arch/x86/entry/syscall_32.c:331\n do_SYSENTER_32+0x1f/0x30 arch/x86/entry/syscall_32.c:369\n entry_SYSENTER_compat_after_hwframe+0x84/0x8e\n\nCPU: 0 UID: 0 PID: 22408 Comm: syz.4.5165 Not tainted 6.15.0-rc3-syzkaller-00019-gbc3372351d0c #0 PREEMPT(undef)\nHardware name: Google Google Compute Engi\n---truncated---", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-37961", "url": "https://www.suse.com/security/cve/CVE-2025-37961" }, { "category": "external", "summary": "SUSE Bug 1243523 for CVE-2025-37961", "url": "https://bugzilla.suse.com/1243523" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2025-37961" }, { "cve": "CVE-2025-37980", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-37980" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nblock: fix resource leak in blk_register_queue() error path\n\nWhen registering a queue fails after blk_mq_sysfs_register() is\nsuccessful but the function later encounters an error, we need\nto clean up the blk_mq_sysfs resources.\n\nAdd the missing blk_mq_sysfs_unregister() call in the error path\nto properly clean up these resources and prevent a memory leak.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-37980", "url": "https://www.suse.com/security/cve/CVE-2025-37980" }, { "category": "external", "summary": "SUSE Bug 1243522 for CVE-2025-37980", "url": "https://bugzilla.suse.com/1243522" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2025-37980" }, { "cve": "CVE-2025-37982", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-37982" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: wl1251: fix memory leak in wl1251_tx_work\n\nThe skb dequeued from tx_queue is lost when wl1251_ps_elp_wakeup fails\nwith a -ETIMEDOUT error. Fix that by queueing the skb back to tx_queue.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-37982", "url": "https://www.suse.com/security/cve/CVE-2025-37982" }, { "category": "external", "summary": "SUSE Bug 1243524 for CVE-2025-37982", "url": "https://bugzilla.suse.com/1243524" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2025-37982" }, { "cve": "CVE-2025-37992", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-37992" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet_sched: Flush gso_skb list too during -\u003echange()\n\nPreviously, when reducing a qdisc\u0027s limit via the -\u003echange() operation, only\nthe main skb queue was trimmed, potentially leaving packets in the gso_skb\nlist. This could result in NULL pointer dereference when we only check\nsch-\u003elimit against sch-\u003eq.qlen.\n\nThis patch introduces a new helper, qdisc_dequeue_internal(), which ensures\nboth the gso_skb list and the main queue are properly flushed when trimming\nexcess packets. All relevant qdiscs (codel, fq, fq_codel, fq_pie, hhf, pie)\nare updated to use this helper in their -\u003echange() routines.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-37992", "url": "https://www.suse.com/security/cve/CVE-2025-37992" }, { "category": "external", "summary": "SUSE Bug 1243698 for CVE-2025-37992", "url": "https://bugzilla.suse.com/1243698" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2025-37992" }, { "cve": "CVE-2025-37995", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-37995" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmodule: ensure that kobject_put() is safe for module type kobjects\n\nIn \u0027lookup_or_create_module_kobject()\u0027, an internal kobject is created\nusing \u0027module_ktype\u0027. So call to \u0027kobject_put()\u0027 on error handling\npath causes an attempt to use an uninitialized completion pointer in\n\u0027module_kobject_release()\u0027. In this scenario, we just want to release\nkobject without an extra synchronization required for a regular module\nunloading process, so adding an extra check whether \u0027complete()\u0027 is\nactually required makes \u0027kobject_put()\u0027 safe.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-37995", "url": "https://www.suse.com/security/cve/CVE-2025-37995" }, { "category": "external", "summary": "SUSE Bug 1243827 for CVE-2025-37995", "url": "https://bugzilla.suse.com/1243827" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2025-37995" }, { "cve": "CVE-2025-37998", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-37998" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nopenvswitch: Fix unsafe attribute parsing in output_userspace()\n\nThis patch replaces the manual Netlink attribute iteration in\noutput_userspace() with nla_for_each_nested(), which ensures that only\nwell-formed attributes are processed.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-37998", "url": "https://www.suse.com/security/cve/CVE-2025-37998" }, { "category": "external", "summary": "SUSE Bug 1243836 for CVE-2025-37998", "url": "https://bugzilla.suse.com/1243836" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "low" } ], "title": "CVE-2025-37998" }, { "cve": "CVE-2025-38000", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-38000" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsch_hfsc: Fix qlen accounting bug when using peek in hfsc_enqueue()\n\nWhen enqueuing the first packet to an HFSC class, hfsc_enqueue() calls the\nchild qdisc\u0027s peek() operation before incrementing sch-\u003eq.qlen and\nsch-\u003eqstats.backlog. If the child qdisc uses qdisc_peek_dequeued(), this may\ntrigger an immediate dequeue and potential packet drop. In such cases,\nqdisc_tree_reduce_backlog() is called, but the HFSC qdisc\u0027s qlen and backlog\nhave not yet been updated, leading to inconsistent queue accounting. This\ncan leave an empty HFSC class in the active list, causing further\nconsequences like use-after-free.\n\nThis patch fixes the bug by moving the increment of sch-\u003eq.qlen and\nsch-\u003eqstats.backlog before the call to the child qdisc\u0027s peek() operation.\nThis ensures that queue length and backlog are always accurate when packet\ndrops or dequeues are triggered during the peek.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-38000", "url": "https://www.suse.com/security/cve/CVE-2025-38000" }, { "category": "external", "summary": "SUSE Bug 1244277 for CVE-2025-38000", "url": "https://bugzilla.suse.com/1244277" }, { "category": "external", "summary": "SUSE Bug 1245775 for CVE-2025-38000", "url": "https://bugzilla.suse.com/1245775" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "important" } ], "title": "CVE-2025-38000" }, { "cve": "CVE-2025-38004", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-38004" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: bcm: add locking for bcm_op runtime updates\n\nThe CAN broadcast manager (CAN BCM) can send a sequence of CAN frames via\nhrtimer. The content and also the length of the sequence can be changed\nresp reduced at runtime where the \u0027currframe\u0027 counter is then set to zero.\n\nAlthough this appeared to be a safe operation the updates of \u0027currframe\u0027\ncan be triggered from user space and hrtimer context in bcm_can_tx().\nAnderson Nascimento created a proof of concept that triggered a KASAN\nslab-out-of-bounds read access which can be prevented with a spin_lock_bh.\n\nAt the rework of bcm_can_tx() the \u0027count\u0027 variable has been moved into\nthe protected section as this variable can be modified from both contexts\ntoo.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-38004", "url": "https://www.suse.com/security/cve/CVE-2025-38004" }, { "category": "external", "summary": "SUSE Bug 1244274 for CVE-2025-38004", "url": "https://bugzilla.suse.com/1244274" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2025-38004" }, { "cve": "CVE-2025-38023", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-38023" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfs: handle failure of nfs_get_lock_context in unlock path\n\nWhen memory is insufficient, the allocation of nfs_lock_context in\nnfs_get_lock_context() fails and returns -ENOMEM. If we mistakenly treat\nan nfs4_unlockdata structure (whose l_ctx member has been set to -ENOMEM)\nas valid and proceed to execute rpc_run_task(), this will trigger a NULL\npointer dereference in nfs4_locku_prepare. For example:\n\nBUG: kernel NULL pointer dereference, address: 000000000000000c\nPGD 0 P4D 0\nOops: Oops: 0000 [#1] SMP PTI\nCPU: 15 UID: 0 PID: 12 Comm: kworker/u64:0 Not tainted 6.15.0-rc2-dirty #60\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-2.fc40\nWorkqueue: rpciod rpc_async_schedule\nRIP: 0010:nfs4_locku_prepare+0x35/0xc2\nCode: 89 f2 48 89 fd 48 c7 c7 68 69 ef b5 53 48 8b 8e 90 00 00 00 48 89 f3\nRSP: 0018:ffffbbafc006bdb8 EFLAGS: 00010246\nRAX: 000000000000004b RBX: ffff9b964fc1fa00 RCX: 0000000000000000\nRDX: 0000000000000000 RSI: fffffffffffffff4 RDI: ffff9ba53fddbf40\nRBP: ffff9ba539934000 R08: 0000000000000000 R09: ffffbbafc006bc38\nR10: ffffffffb6b689c8 R11: 0000000000000003 R12: ffff9ba539934030\nR13: 0000000000000001 R14: 0000000004248060 R15: ffffffffb56d1c30\nFS: 0000000000000000(0000) GS:ffff9ba5881f0000(0000) knlGS:00000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 000000000000000c CR3: 000000093f244000 CR4: 00000000000006f0\nCall Trace:\n \u003cTASK\u003e\n __rpc_execute+0xbc/0x480\n rpc_async_schedule+0x2f/0x40\n process_one_work+0x232/0x5d0\n worker_thread+0x1da/0x3d0\n ? __pfx_worker_thread+0x10/0x10\n kthread+0x10d/0x240\n ? __pfx_kthread+0x10/0x10\n ret_from_fork+0x34/0x50\n ? __pfx_kthread+0x10/0x10\n ret_from_fork_asm+0x1a/0x30\n \u003c/TASK\u003e\nModules linked in:\nCR2: 000000000000000c\n---[ end trace 0000000000000000 ]---\n\nFree the allocated nfs4_unlockdata when nfs_get_lock_context() fails and\nreturn NULL to terminate subsequent rpc_run_task, preventing NULL pointer\ndereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-38023", "url": "https://www.suse.com/security/cve/CVE-2025-38023" }, { "category": "external", "summary": "SUSE Bug 1245004 for CVE-2025-38023", "url": "https://bugzilla.suse.com/1245004" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2025-38023" }, { "cve": "CVE-2025-38024", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-38024" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/rxe: Fix slab-use-after-free Read in rxe_queue_cleanup bug\n\nCall Trace:\n \u003cTASK\u003e\n __dump_stack lib/dump_stack.c:94 [inline]\n dump_stack_lvl+0x7d/0xa0 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:378 [inline]\n print_report+0xcf/0x610 mm/kasan/report.c:489\n kasan_report+0xb5/0xe0 mm/kasan/report.c:602\n rxe_queue_cleanup+0xd0/0xe0 drivers/infiniband/sw/rxe/rxe_queue.c:195\n rxe_cq_cleanup+0x3f/0x50 drivers/infiniband/sw/rxe/rxe_cq.c:132\n __rxe_cleanup+0x168/0x300 drivers/infiniband/sw/rxe/rxe_pool.c:232\n rxe_create_cq+0x22e/0x3a0 drivers/infiniband/sw/rxe/rxe_verbs.c:1109\n create_cq+0x658/0xb90 drivers/infiniband/core/uverbs_cmd.c:1052\n ib_uverbs_create_cq+0xc7/0x120 drivers/infiniband/core/uverbs_cmd.c:1095\n ib_uverbs_write+0x969/0xc90 drivers/infiniband/core/uverbs_main.c:679\n vfs_write fs/read_write.c:677 [inline]\n vfs_write+0x26a/0xcc0 fs/read_write.c:659\n ksys_write+0x1b8/0x200 fs/read_write.c:731\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xaa/0x1b0 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nIn the function rxe_create_cq, when rxe_cq_from_init fails, the function\nrxe_cleanup will be called to handle the allocated resources. In fact,\nsome memory resources have already been freed in the function\nrxe_cq_from_init. Thus, this problem will occur.\n\nThe solution is to let rxe_cleanup do all the work.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-38024", "url": "https://www.suse.com/security/cve/CVE-2025-38024" }, { "category": "external", "summary": "SUSE Bug 1245025 for CVE-2025-38024", "url": "https://bugzilla.suse.com/1245025" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2025-38024" }, { "cve": "CVE-2025-38061", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-38061" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: pktgen: fix access outside of user given buffer in pktgen_thread_write()\n\nHonour the user given buffer size for the strn_len() calls (otherwise\nstrn_len() will access memory outside of the user given buffer).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-38061", "url": "https://www.suse.com/security/cve/CVE-2025-38061" }, { "category": "external", "summary": "SUSE Bug 1245440 for CVE-2025-38061", "url": "https://bugzilla.suse.com/1245440" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2025-38061" }, { "cve": "CVE-2025-38072", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-38072" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nlibnvdimm/labels: Fix divide error in nd_label_data_init()\n\nIf a faulty CXL memory device returns a broken zero LSA size in its\nmemory device information (Identify Memory Device (Opcode 4000h), CXL\nspec. 3.1, 8.2.9.9.1.1), a divide error occurs in the libnvdimm\ndriver:\n\n Oops: divide error: 0000 [#1] PREEMPT SMP NOPTI\n RIP: 0010:nd_label_data_init+0x10e/0x800 [libnvdimm]\n\nCode and flow:\n\n1) CXL Command 4000h returns LSA size = 0\n2) config_size is assigned to zero LSA size (CXL pmem driver):\n\ndrivers/cxl/pmem.c: .config_size = mds-\u003elsa_size,\n\n3) max_xfer is set to zero (nvdimm driver):\n\ndrivers/nvdimm/label.c: max_xfer = min_t(size_t, ndd-\u003ensarea.max_xfer, config_size);\n\n4) A subsequent DIV_ROUND_UP() causes a division by zero:\n\ndrivers/nvdimm/label.c: /* Make our initial read size a multiple of max_xfer size */\ndrivers/nvdimm/label.c: read_size = min(DIV_ROUND_UP(read_size, max_xfer) * max_xfer,\ndrivers/nvdimm/label.c- config_size);\n\nFix this by checking the config size parameter by extending an\nexisting check.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-38072", "url": "https://www.suse.com/security/cve/CVE-2025-38072" }, { "category": "external", "summary": "SUSE Bug 1244743 for CVE-2025-38072", "url": "https://bugzilla.suse.com/1244743" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2025-38072" }, { "cve": "CVE-2025-38078", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-38078" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: pcm: Fix race of buffer access at PCM OSS layer\n\nThe PCM OSS layer tries to clear the buffer with the silence data at\ninitialization (or reconfiguration) of a stream with the explicit call\nof snd_pcm_format_set_silence() with runtime-\u003edma_area. But this may\nlead to a UAF because the accessed runtime-\u003edma_area might be freed\nconcurrently, as it\u0027s performed outside the PCM ops.\n\nFor avoiding it, move the code into the PCM core and perform it inside\nthe buffer access lock, so that it won\u0027t be changed during the\noperation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-38078", "url": "https://www.suse.com/security/cve/CVE-2025-38078" }, { "category": "external", "summary": "SUSE Bug 1244737 for CVE-2025-38078", "url": "https://bugzilla.suse.com/1244737" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "moderate" } ], "title": "CVE-2025-38078" }, { "cve": "CVE-2025-38083", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-38083" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet_sched: prio: fix a race in prio_tune()\n\nGerrard Tai reported a race condition in PRIO, whenever SFQ perturb timer\nfires at the wrong time.\n\nThe race is as follows:\n\nCPU 0 CPU 1\n[1]: lock root\n[2]: qdisc_tree_flush_backlog()\n[3]: unlock root\n |\n | [5]: lock root\n | [6]: rehash\n | [7]: qdisc_tree_reduce_backlog()\n |\n[4]: qdisc_put()\n\nThis can be abused to underflow a parent\u0027s qlen.\n\nCalling qdisc_purge_queue() instead of qdisc_tree_flush_backlog()\nshould fix the race, because all packets will be purged from the qdisc\nbefore releasing the lock.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-38083", "url": "https://www.suse.com/security/cve/CVE-2025-38083" }, { "category": "external", "summary": "SUSE Bug 1245183 for CVE-2025-38083", "url": "https://bugzilla.suse.com/1245183" }, { "category": "external", "summary": "SUSE Bug 1245350 for CVE-2025-38083", "url": "https://bugzilla.suse.com/1245350" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_266-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.266.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.266.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.266.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-16T13:46:06Z", "details": "important" } ], "title": "CVE-2025-38083" } ] }
wid-sec-w-2025-1350
Vulnerability from csaf_certbund
Published
2025-06-17 22:00
Modified
2025-08-12 22:00
Summary
Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Der Kernel stellt den Kern des Linux Betriebssystems dar.
Angriff
Ein lokaler Angreifer kann mehrere Schwachstellen in Linux Kernel ausnutzen, um einen Denial of Service Angriff durchzuführen.
Betroffene Betriebssysteme
- Linux
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein lokaler Angreifer kann mehrere Schwachstellen in Linux Kernel ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2025-1350 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-1350.json" }, { "category": "self", "summary": "WID-SEC-2025-1350 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1350" }, { "category": "external", "summary": "Kernel CVE Announce Mailingliste", "url": "https://lore.kernel.org/linux-cve-announce/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38038", "url": "https://lore.kernel.org/linux-cve-announce/2025061827-CVE-2025-38038-797b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38053", "url": "https://lore.kernel.org/linux-cve-announce/2025061832-CVE-2025-38053-e145@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38054", "url": "https://lore.kernel.org/linux-cve-announce/2025061832-CVE-2025-38054-4ba3@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38055", "url": "https://lore.kernel.org/linux-cve-announce/2025061833-CVE-2025-38055-896f@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38056", "url": "https://lore.kernel.org/linux-cve-announce/2025061833-CVE-2025-38056-9d12@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38062", "url": "https://lore.kernel.org/linux-cve-announce/2025061835-CVE-2025-38062-f2b5@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38063", "url": "https://lore.kernel.org/linux-cve-announce/2025061835-CVE-2025-38063-e0a8@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38064", "url": "https://lore.kernel.org/linux-cve-announce/2025061836-CVE-2025-38064-8108@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38065", "url": "https://lore.kernel.org/linux-cve-announce/2025061836-CVE-2025-38065-e91a@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38066", "url": "https://lore.kernel.org/linux-cve-announce/2025061837-CVE-2025-38066-b3f6@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38067", "url": "https://lore.kernel.org/linux-cve-announce/2025061837-CVE-2025-38067-b173@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38068", "url": "https://lore.kernel.org/linux-cve-announce/2025061837-CVE-2025-38068-02a8@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38069", "url": "https://lore.kernel.org/linux-cve-announce/2025061838-CVE-2025-38069-b1a0@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38070", "url": "https://lore.kernel.org/linux-cve-announce/2025061838-CVE-2025-38070-8f13@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38071", "url": "https://lore.kernel.org/linux-cve-announce/2025061838-CVE-2025-38071-cc7c@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38072", "url": "https://lore.kernel.org/linux-cve-announce/2025061839-CVE-2025-38072-a259@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38073", "url": "https://lore.kernel.org/linux-cve-announce/2025061839-CVE-2025-38073-4f76@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38074", "url": "https://lore.kernel.org/linux-cve-announce/2025061839-CVE-2025-38074-dc14@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38075", "url": "https://lore.kernel.org/linux-cve-announce/2025061840-CVE-2025-38075-19d6@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38076", "url": "https://lore.kernel.org/linux-cve-announce/2025061840-CVE-2025-38076-359d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38077", "url": "https://lore.kernel.org/linux-cve-announce/2025061840-CVE-2025-38077-f53e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38078", "url": "https://lore.kernel.org/linux-cve-announce/2025061841-CVE-2025-38078-3f10@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38079", "url": "https://lore.kernel.org/linux-cve-announce/2025061841-CVE-2025-38079-7fa5@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38080", "url": "https://lore.kernel.org/linux-cve-announce/2025061842-CVE-2025-38080-849c@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38081", "url": "https://lore.kernel.org/linux-cve-announce/2025061842-CVE-2025-38081-8916@gregkh/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02254-1 vom 2025-07-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021770.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:10675 vom 2025-07-09", "url": "https://access.redhat.com/errata/RHSA-2025:10675" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:10671 vom 2025-07-09", "url": "https://access.redhat.com/errata/RHSA-2025:10671" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02249-1 vom 2025-07-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021766.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:10761 vom 2025-07-10", "url": "https://access.redhat.com/errata/RHSA-2025:10761" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.15-2025-078 vom 2025-07-10", "url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.15-2025-078.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.15-2025-083 vom 2025-07-10", "url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.15-2025-083.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02264-1 vom 2025-07-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021785.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:10830 vom 2025-07-14", "url": "https://access.redhat.com/errata/RHSA-2025:10830" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:10834 vom 2025-07-14", "url": "https://access.redhat.com/errata/RHSA-2025:10834" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:10828 vom 2025-07-14", "url": "https://access.redhat.com/errata/RHSA-2025:10828" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:10829 vom 2025-07-14", "url": "https://access.redhat.com/errata/RHSA-2025:10829" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02308-1 vom 2025-07-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021805.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02307-1 vom 2025-07-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021804.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02321-1 vom 2025-07-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021811.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02320-1 vom 2025-07-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021812.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02322-1 vom 2025-07-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021810.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02312-1 vom 2025-07-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021806.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-20470 vom 2025-07-16", "url": "https://linux.oracle.com/errata/ELSA-2025-20470.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:11358 vom 2025-07-17", "url": "https://access.redhat.com/errata/RHSA-2025:11358" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02335-1 vom 2025-07-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021828.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02334-1 vom 2025-07-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021829.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02333-1 vom 2025-07-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021830.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:11375 vom 2025-07-17", "url": "https://access.redhat.com/errata/RHSA-2025:11375" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7654-1 vom 2025-07-18", "url": "https://ubuntu.com/security/notices/USN-7654-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7654-2 vom 2025-07-18", "url": "https://ubuntu.com/security/notices/USN-7654-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7654-3 vom 2025-07-18", "url": "https://ubuntu.com/security/notices/USN-7654-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7655-1 vom 2025-07-18", "url": "https://ubuntu.com/security/notices/USN-7655-1" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-20480 vom 2025-07-18", "url": "https://linux.oracle.com/errata/ELSA-2025-20480.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20483-1 vom 2025-07-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021917.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20475-1 vom 2025-07-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021919.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7654-4 vom 2025-07-22", "url": "https://ubuntu.com/security/notices/USN-7654-4" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20493-1 vom 2025-07-25", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021967.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20498-1 vom 2025-07-25", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021965.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:11851 vom 2025-07-28", "url": "https://access.redhat.com/errata/RHSA-2025:11851" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02537-1 vom 2025-07-28", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021978.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02538-1 vom 2025-07-28", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021981.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:11850 vom 2025-07-28", "url": "https://access.redhat.com/errata/RHSA-2025:11850" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-11850 vom 2025-07-29", "url": "https://linux.oracle.com/errata/ELSA-2025-11850.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:12238 vom 2025-07-30", "url": "https://access.redhat.com/errata/RHSA-2025:12238" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7654-5 vom 2025-07-29", "url": "https://ubuntu.com/security/notices/USN-7654-5" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:12209 vom 2025-07-29", "url": "https://access.redhat.com/errata/RHSA-2025:12209" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2LIVEPATCH-2025-247 vom 2025-07-30", "url": "https://alas.aws.amazon.com/AL2/ALAS2LIVEPATCH-2025-247.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:12311 vom 2025-07-30", "url": "https://access.redhat.com/errata/RHSA-2025:12311" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2LIVEPATCH-2025-246 vom 2025-07-30", "url": "https://alas.aws.amazon.com/AL2/ALAS2LIVEPATCH-2025-246.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2LIVEPATCH-2025-248 vom 2025-07-30", "url": "https://alas.aws.amazon.com/AL2/ALAS2LIVEPATCH-2025-248.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2-2025-2944 vom 2025-07-30", "url": "https://alas.aws.amazon.com/AL2/ALAS2-2025-2944.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2LIVEPATCH-2025-249 vom 2025-07-30", "url": "https://alas.aws.amazon.com/AL2/ALAS2LIVEPATCH-2025-249.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:12525 vom 2025-08-04", "url": "https://access.redhat.com/errata/RHSA-2025:12525" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02588-1 vom 2025-08-01", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VQYPF6FAXKWBHQ4POBUPZVPW4L73XJR5/" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:12623 vom 2025-08-04", "url": "https://access.redhat.com/errata/RHSA-2025:12623" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:12662 vom 2025-08-04", "url": "https://access.redhat.com/errata/RHSA-2025:12662" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:12526 vom 2025-08-05", "url": "https://access.redhat.com/errata/RHSA-2025:12526" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.10-2025-100 vom 2025-08-05", "url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.10-2025-100.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:12753 vom 2025-08-04", "url": "https://access.redhat.com/errata/RHSA-2025:12753" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:12752 vom 2025-08-04", "url": "https://access.redhat.com/errata/RHSA-2025:12752" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2-2025-2955 vom 2025-08-05", "url": "https://alas.aws.amazon.com/AL2/ALAS2-2025-2955.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:12746 vom 2025-08-04", "url": "https://access.redhat.com/errata/RHSA-2025:12746" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.15-2025-086 vom 2025-08-05", "url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.15-2025-086.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.4-2025-105 vom 2025-08-05", "url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.4-2025-105.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.10-2025-098 vom 2025-08-05", "url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.10-2025-098.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-11358 vom 2025-08-05", "url": "http://linux.oracle.com/errata/ELSA-2025-11358.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:13061 vom 2025-08-05", "url": "https://access.redhat.com/errata/RHSA-2025:13061" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7686-1 vom 2025-08-05", "url": "https://ubuntu.com/security/notices/USN-7686-1" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:13030 vom 2025-08-05", "url": "https://access.redhat.com/errata/RHSA-2025:13030" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:13120 vom 2025-08-06", "url": "https://access.redhat.com/errata/RHSA-2025:13120" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:13029 vom 2025-08-05", "url": "https://access.redhat.com/errata/RHSA-2025:13029" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:13135 vom 2025-08-06", "url": "https://access.redhat.com/errata/RHSA-2025:13135" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-12752 vom 2025-08-07", "url": "http://linux.oracle.com/errata/ELSA-2025-12752.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-12746 vom 2025-08-06", "url": "https://linux.oracle.com/errata/ELSA-2025-12746.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.15-2025-087 vom 2025-08-09", "url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.15-2025-087.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.4-2025-106 vom 2025-08-09", "url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.4-2025-106.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.10-2025-101 vom 2025-08-09", "url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.10-2025-101.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:13602 vom 2025-08-11", "url": "https://access.redhat.com/errata/RHSA-2025:13602" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:13598 vom 2025-08-11", "url": "https://access.redhat.com/errata/RHSA-2025:13598" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-20521 vom 2025-08-11", "url": "https://linux.oracle.com/errata/ELSA-2025-20521.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-12662 vom 2025-08-11", "url": "https://linux.oracle.com/errata/ELSA-2025-12662.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:13633 vom 2025-08-11", "url": "https://access.redhat.com/errata/RHSA-2025:13633" }, { "category": "external", "summary": "Debian Security Advisory DLA-4271 vom 2025-08-13", "url": "https://lists.debian.org/debian-lts-announce/2025/08/msg00010.html" }, { "category": "external", "summary": "Debian Security Advisory DSA-5973 vom 2025-08-12", "url": "https://lists.debian.org/debian-security-announce/2025/msg00137.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:13776 vom 2025-08-13", "url": "https://access.redhat.com/errata/RHSA-2025:13776" } ], "source_lang": "en-US", "title": "Linux Kernel: Mehrere Schwachstellen erm\u00f6glichen Denial of Service", "tracking": { "current_release_date": "2025-08-12T22:00:00.000+00:00", "generator": { "date": "2025-08-13T06:22:39.315+00:00", "engine": { "name": "BSI-WID", "version": "1.4.0" } }, "id": "WID-SEC-W-2025-1350", "initial_release_date": "2025-06-17T22:00:00.000+00:00", "revision_history": [ { "date": "2025-06-17T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2025-07-08T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von SUSE und Red Hat aufgenommen" }, { "date": "2025-07-09T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-07-10T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Amazon und SUSE aufgenommen" }, { "date": "2025-07-13T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-07-14T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-07-15T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-07-16T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von Red Hat und SUSE aufgenommen" }, { "date": "2025-07-17T22:00:00.000+00:00", "number": "9", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-07-20T22:00:00.000+00:00", "number": "10", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2025-07-21T22:00:00.000+00:00", "number": "11", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-07-27T22:00:00.000+00:00", "number": "12", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-07-28T22:00:00.000+00:00", "number": "13", "summary": "Neue Updates von SUSE und Red Hat aufgenommen" }, { "date": "2025-07-29T22:00:00.000+00:00", "number": "14", "summary": "Neue Updates von Red Hat und Ubuntu aufgenommen" }, { "date": "2025-07-30T22:00:00.000+00:00", "number": "15", "summary": "Neue Updates von Amazon und Red Hat aufgenommen" }, { "date": "2025-08-03T22:00:00.000+00:00", "number": "16", "summary": "Neue Updates von Red Hat und SUSE aufgenommen" }, { "date": "2025-08-04T22:00:00.000+00:00", "number": "17", "summary": "Neue Updates von Red Hat und Amazon aufgenommen" }, { "date": "2025-08-05T22:00:00.000+00:00", "number": "18", "summary": "Neue Updates von Oracle Linux, Red Hat und Ubuntu aufgenommen" }, { "date": "2025-08-06T22:00:00.000+00:00", "number": "19", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2025-08-10T22:00:00.000+00:00", "number": "20", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2025-08-11T22:00:00.000+00:00", "number": "21", "summary": "Neue Updates von Oracle Linux und Red Hat aufgenommen" }, { "date": "2025-08-12T22:00:00.000+00:00", "number": "22", "summary": "Neue Updates von Debian und Red Hat aufgenommen" } ], "status": "final", "version": "22" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "Open Source Linux Kernel", "product": { "name": "Open Source Linux Kernel", "product_id": "T029677", "product_identification_helper": { "cpe": "cpe:/o:linux:linux_kernel:-" } } } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-49934", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-49934" }, { "cve": "CVE-2022-49935", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-49935" }, { "cve": "CVE-2022-49936", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-49936" }, { "cve": "CVE-2022-49937", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-49937" }, { "cve": "CVE-2022-49938", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-49938" }, { "cve": "CVE-2022-49939", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-49939" }, { "cve": "CVE-2022-49940", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-49940" }, { "cve": "CVE-2022-49941", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-49941" }, { "cve": "CVE-2022-49942", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-49942" }, { "cve": "CVE-2022-49943", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-49943" }, { "cve": "CVE-2022-49944", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-49944" }, { "cve": "CVE-2022-49945", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-49945" }, { "cve": "CVE-2022-49946", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-49946" }, { "cve": "CVE-2022-49947", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-49947" }, { "cve": "CVE-2022-49948", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-49948" }, { "cve": "CVE-2022-49949", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-49949" }, { "cve": "CVE-2022-49950", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-49950" }, { "cve": "CVE-2022-49951", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-49951" }, { "cve": "CVE-2022-49952", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-49952" }, { "cve": "CVE-2022-49953", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-49953" }, { "cve": "CVE-2022-49954", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-49954" }, { "cve": "CVE-2022-49955", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-49955" }, { "cve": "CVE-2022-49956", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-49956" }, { "cve": "CVE-2022-49957", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-49957" }, { "cve": "CVE-2022-49958", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-49958" }, { "cve": "CVE-2022-49959", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-49959" }, { "cve": "CVE-2022-49960", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-49960" }, { "cve": "CVE-2022-49961", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-49961" }, { "cve": "CVE-2022-49962", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-49962" }, { "cve": "CVE-2022-49963", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-49963" }, { "cve": "CVE-2022-49964", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-49964" }, { "cve": "CVE-2022-49965", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-49965" }, { "cve": "CVE-2022-49966", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-49966" }, { "cve": "CVE-2022-49967", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-49967" }, { "cve": "CVE-2022-49968", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-49968" }, { "cve": "CVE-2022-49969", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-49969" }, { "cve": "CVE-2022-49970", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-49970" }, { "cve": "CVE-2022-49971", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-49971" }, { "cve": "CVE-2022-49972", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-49972" }, { "cve": "CVE-2022-49973", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-49973" }, { "cve": "CVE-2022-49974", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-49974" }, { "cve": "CVE-2022-49975", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-49975" }, { "cve": "CVE-2022-49976", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-49976" }, { "cve": "CVE-2022-49977", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-49977" }, { "cve": "CVE-2022-49978", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-49978" }, { "cve": "CVE-2022-49979", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-49979" }, { "cve": "CVE-2022-49980", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-49980" }, { "cve": "CVE-2022-49981", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-49981" }, { "cve": "CVE-2022-49982", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-49982" }, { "cve": "CVE-2022-49983", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-49983" }, { "cve": "CVE-2022-49984", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-49984" }, { "cve": "CVE-2022-49985", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-49985" }, { "cve": "CVE-2022-49986", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-49986" }, { "cve": "CVE-2022-49987", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-49987" }, { "cve": "CVE-2022-49988", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-49988" }, { "cve": "CVE-2022-49989", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-49989" }, { "cve": "CVE-2022-49990", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-49990" }, { "cve": "CVE-2022-49991", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-49991" }, { "cve": "CVE-2022-49992", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-49992" }, { "cve": "CVE-2022-49993", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-49993" }, { "cve": "CVE-2022-49994", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-49994" }, { "cve": "CVE-2022-49995", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-49995" }, { "cve": "CVE-2022-49996", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-49996" }, { "cve": "CVE-2022-49997", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-49997" }, { "cve": "CVE-2022-49998", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-49998" }, { "cve": "CVE-2022-49999", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-49999" }, { "cve": "CVE-2022-50000", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50000" }, { "cve": "CVE-2022-50001", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50001" }, { "cve": "CVE-2022-50002", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50002" }, { "cve": "CVE-2022-50003", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50003" }, { "cve": "CVE-2022-50004", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50004" }, { "cve": "CVE-2022-50005", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50005" }, { "cve": "CVE-2022-50006", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50006" }, { "cve": "CVE-2022-50007", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50007" }, { "cve": "CVE-2022-50008", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50008" }, { "cve": "CVE-2022-50009", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50009" }, { "cve": "CVE-2022-50010", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50010" }, { "cve": "CVE-2022-50011", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50011" }, { "cve": "CVE-2022-50012", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50012" }, { "cve": "CVE-2022-50013", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50013" }, { "cve": "CVE-2022-50014", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50014" }, { "cve": "CVE-2022-50015", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50015" }, { "cve": "CVE-2022-50016", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50016" }, { "cve": "CVE-2022-50017", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50017" }, { "cve": "CVE-2022-50018", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50018" }, { "cve": "CVE-2022-50019", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50019" }, { "cve": "CVE-2022-50020", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50020" }, { "cve": "CVE-2022-50021", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50021" }, { "cve": "CVE-2022-50022", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50022" }, { "cve": "CVE-2022-50023", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50023" }, { "cve": "CVE-2022-50024", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50024" }, { "cve": "CVE-2022-50025", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50025" }, { "cve": "CVE-2022-50026", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50026" }, { "cve": "CVE-2022-50027", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50027" }, { "cve": "CVE-2022-50028", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50028" }, { "cve": "CVE-2022-50029", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50029" }, { "cve": "CVE-2022-50030", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50030" }, { "cve": "CVE-2022-50031", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50031" }, { "cve": "CVE-2022-50032", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50032" }, { "cve": "CVE-2022-50033", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50033" }, { "cve": "CVE-2022-50034", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50034" }, { "cve": "CVE-2022-50035", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50035" }, { "cve": "CVE-2022-50036", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50036" }, { "cve": "CVE-2022-50037", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50037" }, { "cve": "CVE-2022-50038", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50038" }, { "cve": "CVE-2022-50039", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50039" }, { "cve": "CVE-2022-50040", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50040" }, { "cve": "CVE-2022-50041", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50041" }, { "cve": "CVE-2022-50042", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50042" }, { "cve": "CVE-2022-50043", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50043" }, { "cve": "CVE-2022-50044", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50044" }, { "cve": "CVE-2022-50045", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50045" }, { "cve": "CVE-2022-50046", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50046" }, { "cve": "CVE-2022-50047", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50047" }, { "cve": "CVE-2022-50048", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50048" }, { "cve": "CVE-2022-50049", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50049" }, { "cve": "CVE-2022-50050", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50050" }, { "cve": "CVE-2022-50051", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50051" }, { "cve": "CVE-2022-50052", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50052" }, { "cve": "CVE-2022-50053", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50053" }, { "cve": "CVE-2022-50054", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50054" }, { "cve": "CVE-2022-50055", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50055" }, { "cve": "CVE-2022-50056", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50056" }, { "cve": "CVE-2022-50057", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50057" }, { "cve": "CVE-2022-50058", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50058" }, { "cve": "CVE-2022-50059", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50059" }, { "cve": "CVE-2022-50060", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50060" }, { "cve": "CVE-2022-50061", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50061" }, { "cve": "CVE-2022-50062", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50062" }, { "cve": "CVE-2022-50063", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50063" }, { "cve": "CVE-2022-50064", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50064" }, { "cve": "CVE-2022-50065", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50065" }, { "cve": "CVE-2022-50066", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50066" }, { "cve": "CVE-2022-50067", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50067" }, { "cve": "CVE-2022-50068", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50068" }, { "cve": "CVE-2022-50069", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50069" }, { "cve": "CVE-2022-50070", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50070" }, { "cve": "CVE-2022-50071", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50071" }, { "cve": "CVE-2022-50072", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50072" }, { "cve": "CVE-2022-50073", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50073" }, { "cve": "CVE-2022-50074", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50074" }, { "cve": "CVE-2022-50075", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50075" }, { "cve": "CVE-2022-50076", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50076" }, { "cve": "CVE-2022-50077", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50077" }, { "cve": "CVE-2022-50078", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50078" }, { "cve": "CVE-2022-50079", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50079" }, { "cve": "CVE-2022-50080", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50080" }, { "cve": "CVE-2022-50081", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50081" }, { "cve": "CVE-2022-50082", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50082" }, { "cve": "CVE-2022-50083", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50083" }, { "cve": "CVE-2022-50084", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50084" }, { "cve": "CVE-2022-50085", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50085" }, { "cve": "CVE-2022-50086", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50086" }, { "cve": "CVE-2022-50087", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50087" }, { "cve": "CVE-2022-50088", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50088" }, { "cve": "CVE-2022-50089", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50089" }, { "cve": "CVE-2022-50090", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50090" }, { "cve": "CVE-2022-50091", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50091" }, { "cve": "CVE-2022-50092", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50092" }, { "cve": "CVE-2022-50093", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50093" }, { "cve": "CVE-2022-50094", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50094" }, { "cve": "CVE-2022-50095", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50095" }, { "cve": "CVE-2022-50096", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50096" }, { "cve": "CVE-2022-50097", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50097" }, { "cve": "CVE-2022-50098", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50098" }, { "cve": "CVE-2022-50099", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50099" }, { "cve": "CVE-2022-50100", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50100" }, { "cve": "CVE-2022-50101", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50101" }, { "cve": "CVE-2022-50102", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50102" }, { "cve": "CVE-2022-50103", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50103" }, { "cve": "CVE-2022-50104", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50104" }, { "cve": "CVE-2022-50105", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50105" }, { "cve": "CVE-2022-50106", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50106" }, { "cve": "CVE-2022-50107", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50107" }, { "cve": "CVE-2022-50108", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50108" }, { "cve": "CVE-2022-50109", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50109" }, { "cve": "CVE-2022-50110", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50110" }, { "cve": "CVE-2022-50111", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50111" }, { "cve": "CVE-2022-50112", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50112" }, { "cve": "CVE-2022-50113", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50113" }, { "cve": "CVE-2022-50114", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50114" }, { "cve": "CVE-2022-50115", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50115" }, { "cve": "CVE-2022-50116", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50116" }, { "cve": "CVE-2022-50117", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50117" }, { "cve": "CVE-2022-50118", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50118" }, { "cve": "CVE-2022-50119", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50119" }, { "cve": "CVE-2022-50120", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50120" }, { "cve": "CVE-2022-50121", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50121" }, { "cve": "CVE-2022-50122", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50122" }, { "cve": "CVE-2022-50123", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50123" }, { "cve": "CVE-2022-50124", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50124" }, { "cve": "CVE-2022-50125", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50125" }, { "cve": "CVE-2022-50126", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50126" }, { "cve": "CVE-2022-50127", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50127" }, { "cve": "CVE-2022-50128", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50128" }, { "cve": "CVE-2022-50129", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50129" }, { "cve": "CVE-2022-50130", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50130" }, { "cve": "CVE-2022-50131", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50131" }, { "cve": "CVE-2022-50132", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50132" }, { "cve": "CVE-2022-50133", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50133" }, { "cve": "CVE-2022-50134", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50134" }, { "cve": "CVE-2022-50135", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50135" }, { "cve": "CVE-2022-50136", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50136" }, { "cve": "CVE-2022-50137", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50137" }, { "cve": "CVE-2022-50138", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50138" }, { "cve": "CVE-2022-50139", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50139" }, { "cve": "CVE-2022-50140", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50140" }, { "cve": "CVE-2022-50141", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50141" }, { "cve": "CVE-2022-50142", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50142" }, { "cve": "CVE-2022-50143", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50143" }, { "cve": "CVE-2022-50144", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50144" }, { "cve": "CVE-2022-50145", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50145" }, { "cve": "CVE-2022-50146", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50146" }, { "cve": "CVE-2022-50147", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50147" }, { "cve": "CVE-2022-50148", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50148" }, { "cve": "CVE-2022-50149", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50149" }, { "cve": "CVE-2022-50150", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50150" }, { "cve": "CVE-2022-50151", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50151" }, { "cve": "CVE-2022-50152", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50152" }, { "cve": "CVE-2022-50153", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50153" }, { "cve": "CVE-2022-50154", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50154" }, { "cve": "CVE-2022-50155", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50155" }, { "cve": "CVE-2022-50156", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50156" }, { "cve": "CVE-2022-50157", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50157" }, { "cve": "CVE-2022-50158", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50158" }, { "cve": "CVE-2022-50159", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50159" }, { "cve": "CVE-2022-50160", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50160" }, { "cve": "CVE-2022-50161", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50161" }, { "cve": "CVE-2022-50162", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50162" }, { "cve": "CVE-2022-50163", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50163" }, { "cve": "CVE-2022-50164", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50164" }, { "cve": "CVE-2022-50165", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50165" }, { "cve": "CVE-2022-50166", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50166" }, { "cve": "CVE-2022-50167", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50167" }, { "cve": "CVE-2022-50168", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50168" }, { "cve": "CVE-2022-50169", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50169" }, { "cve": "CVE-2022-50170", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50170" }, { "cve": "CVE-2022-50171", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50171" }, { "cve": "CVE-2022-50172", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50172" }, { "cve": "CVE-2022-50173", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50173" }, { "cve": "CVE-2022-50174", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50174" }, { "cve": "CVE-2022-50175", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50175" }, { "cve": "CVE-2022-50176", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50176" }, { "cve": "CVE-2022-50177", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50177" }, { "cve": "CVE-2022-50178", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50178" }, { "cve": "CVE-2022-50179", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50179" }, { "cve": "CVE-2022-50180", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50180" }, { "cve": "CVE-2022-50181", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50181" }, { "cve": "CVE-2022-50182", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50182" }, { "cve": "CVE-2022-50183", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50183" }, { "cve": "CVE-2022-50184", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50184" }, { "cve": "CVE-2022-50185", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50185" }, { "cve": "CVE-2022-50186", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50186" }, { "cve": "CVE-2022-50187", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50187" }, { "cve": "CVE-2022-50188", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50188" }, { "cve": "CVE-2022-50189", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50189" }, { "cve": "CVE-2022-50190", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50190" }, { "cve": "CVE-2022-50191", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50191" }, { "cve": "CVE-2022-50192", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50192" }, { "cve": "CVE-2022-50193", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50193" }, { "cve": "CVE-2022-50194", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50194" }, { "cve": "CVE-2022-50195", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50195" }, { "cve": "CVE-2022-50196", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50196" }, { "cve": "CVE-2022-50197", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50197" }, { "cve": "CVE-2022-50198", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50198" }, { "cve": "CVE-2022-50199", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50199" }, { "cve": "CVE-2022-50200", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50200" }, { "cve": "CVE-2022-50201", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50201" }, { "cve": "CVE-2022-50202", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50202" }, { "cve": "CVE-2022-50203", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50203" }, { "cve": "CVE-2022-50204", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50204" }, { "cve": "CVE-2022-50205", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50205" }, { "cve": "CVE-2022-50206", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50206" }, { "cve": "CVE-2022-50207", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50207" }, { "cve": "CVE-2022-50208", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50208" }, { "cve": "CVE-2022-50209", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50209" }, { "cve": "CVE-2022-50210", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50210" }, { "cve": "CVE-2022-50211", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50211" }, { "cve": "CVE-2022-50212", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50212" }, { "cve": "CVE-2022-50213", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50213" }, { "cve": "CVE-2022-50214", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50214" }, { "cve": "CVE-2022-50215", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50215" }, { "cve": "CVE-2022-50216", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50216" }, { "cve": "CVE-2022-50217", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50217" }, { "cve": "CVE-2022-50218", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50218" }, { "cve": "CVE-2022-50219", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50219" }, { "cve": "CVE-2022-50220", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50220" }, { "cve": "CVE-2022-50221", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50221" }, { "cve": "CVE-2022-50222", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50222" }, { "cve": "CVE-2022-50223", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50223" }, { "cve": "CVE-2022-50224", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50224" }, { "cve": "CVE-2022-50225", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50225" }, { "cve": "CVE-2022-50226", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50226" }, { "cve": "CVE-2022-50227", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50227" }, { "cve": "CVE-2022-50228", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50228" }, { "cve": "CVE-2022-50229", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50229" }, { "cve": "CVE-2022-50230", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50230" }, { "cve": "CVE-2022-50231", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50231" }, { "cve": "CVE-2022-50232", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2022-50232" }, { "cve": "CVE-2025-38005", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2025-38005" }, { "cve": "CVE-2025-38006", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2025-38006" }, { "cve": "CVE-2025-38007", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2025-38007" }, { "cve": "CVE-2025-38008", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2025-38008" }, { "cve": "CVE-2025-38009", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2025-38009" }, { "cve": "CVE-2025-38010", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2025-38010" }, { "cve": "CVE-2025-38011", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2025-38011" }, { "cve": "CVE-2025-38012", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2025-38012" }, { "cve": "CVE-2025-38013", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2025-38013" }, { "cve": "CVE-2025-38014", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2025-38014" }, { "cve": "CVE-2025-38015", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2025-38015" }, { "cve": "CVE-2025-38016", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2025-38016" }, { "cve": "CVE-2025-38017", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2025-38017" }, { "cve": "CVE-2025-38018", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2025-38018" }, { "cve": "CVE-2025-38019", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2025-38019" }, { "cve": "CVE-2025-38020", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2025-38020" }, { "cve": "CVE-2025-38021", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2025-38021" }, { "cve": "CVE-2025-38022", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2025-38022" }, { "cve": "CVE-2025-38023", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2025-38023" }, { "cve": "CVE-2025-38024", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2025-38024" }, { "cve": "CVE-2025-38025", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2025-38025" }, { "cve": "CVE-2025-38026", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2025-38026" }, { "cve": "CVE-2025-38027", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2025-38027" }, { "cve": "CVE-2025-38028", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2025-38028" }, { "cve": "CVE-2025-38029", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2025-38029" }, { "cve": "CVE-2025-38030", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2025-38030" }, { "cve": "CVE-2025-38031", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2025-38031" }, { "cve": "CVE-2025-38032", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2025-38032" }, { "cve": "CVE-2025-38033", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2025-38033" }, { "cve": "CVE-2025-38034", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2025-38034" }, { "cve": "CVE-2025-38035", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2025-38035" }, { "cve": "CVE-2025-38036", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2025-38036" }, { "cve": "CVE-2025-38037", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2025-38037" }, { "cve": "CVE-2025-38038", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2025-38038" }, { "cve": "CVE-2025-38039", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2025-38039" }, { "cve": "CVE-2025-38040", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2025-38040" }, { "cve": "CVE-2025-38041", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2025-38041" }, { "cve": "CVE-2025-38042", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2025-38042" }, { "cve": "CVE-2025-38043", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2025-38043" }, { "cve": "CVE-2025-38044", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2025-38044" }, { "cve": "CVE-2025-38045", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2025-38045" }, { "cve": "CVE-2025-38046", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2025-38046" }, { "cve": "CVE-2025-38047", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2025-38047" }, { "cve": "CVE-2025-38048", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2025-38048" }, { "cve": "CVE-2025-38050", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2025-38050" }, { "cve": "CVE-2025-38051", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2025-38051" }, { "cve": "CVE-2025-38052", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2025-38052" }, { "cve": "CVE-2025-38053", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2025-38053" }, { "cve": "CVE-2025-38054", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2025-38054" }, { "cve": "CVE-2025-38055", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2025-38055" }, { "cve": "CVE-2025-38056", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2025-38056" }, { "cve": "CVE-2025-38057", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2025-38057" }, { "cve": "CVE-2025-38058", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2025-38058" }, { "cve": "CVE-2025-38059", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2025-38059" }, { "cve": "CVE-2025-38060", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2025-38060" }, { "cve": "CVE-2025-38061", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2025-38061" }, { "cve": "CVE-2025-38062", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2025-38062" }, { "cve": "CVE-2025-38063", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2025-38063" }, { "cve": "CVE-2025-38064", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2025-38064" }, { "cve": "CVE-2025-38065", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2025-38065" }, { "cve": "CVE-2025-38066", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2025-38066" }, { "cve": "CVE-2025-38067", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2025-38067" }, { "cve": "CVE-2025-38068", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2025-38068" }, { "cve": "CVE-2025-38069", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2025-38069" }, { "cve": "CVE-2025-38070", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2025-38070" }, { "cve": "CVE-2025-38071", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2025-38071" }, { "cve": "CVE-2025-38072", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2025-38072" }, { "cve": "CVE-2025-38073", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2025-38073" }, { "cve": "CVE-2025-38074", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2025-38074" }, { "cve": "CVE-2025-38075", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2025-38075" }, { "cve": "CVE-2025-38076", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2025-38076" }, { "cve": "CVE-2025-38077", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2025-38077" }, { "cve": "CVE-2025-38078", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2025-38078" }, { "cve": "CVE-2025-38079", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2025-38079" }, { "cve": "CVE-2025-38080", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2025-38080" }, { "cve": "CVE-2025-38081", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2025-38081" }, { "cve": "CVE-2025-38082", "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T004914", "T029677" ] }, "release_date": "2025-06-17T22:00:00.000+00:00", "title": "CVE-2025-38082" } ] }
ghsa-h8hg-357g-gr7f
Vulnerability from github
Published
2025-06-18 12:30
Modified
2025-06-18 12:30
VLAI Severity ?
Details
In the Linux kernel, the following vulnerability has been resolved:
net: pktgen: fix access outside of user given buffer in pktgen_thread_write()
Honour the user given buffer size for the strn_len() calls (otherwise strn_len() will access memory outside of the user given buffer).
{ "affected": [], "aliases": [ "CVE-2025-38061" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-06-18T10:15:38Z", "severity": null }, "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: pktgen: fix access outside of user given buffer in pktgen_thread_write()\n\nHonour the user given buffer size for the strn_len() calls (otherwise\nstrn_len() will access memory outside of the user given buffer).", "id": "GHSA-h8hg-357g-gr7f", "modified": "2025-06-18T12:30:33Z", "published": "2025-06-18T12:30:33Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-38061" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/128cdb617a87767c29be43e4431129942fce41df" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/425e64440ad0a2f03bdaf04be0ae53dededbaa77" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/5bfa81539e22af4c40ae5d43d7212253462383a6" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/6b1d3e9db82d01a88de1795b879df67c2116b4f4" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/8fef258b555c75a467a6b4b7e3a3cbc46d5f4102" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/a3d89f1cfe1e6d4bb164db2595511fd33db21900" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/c81c2ee1c3b050ed5c4e92876590cc7a259183f6" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/ef1158a6a650ecee72ab40851b1d52e04d3f9cb5" } ], "schema_version": "1.4.0", "severity": [] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…