suse-su-2025:20206-1
Vulnerability from csaf_suse
Published
2025-04-25 09:37
Modified
2025-04-25 09:37
Summary
Security update for the Linux Kernel

Notes

Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise Micro 6.0 and 6.1 RT kernel was updated to receive various security bugfixes. The following security bugs were fixed: - CVE-2024-27415: netfilter: br_netfilter: skip conntrack input hook for promisc packets (bsc#1224757). - CVE-2024-50038: netfilter: xtables: fix typo causing some targets not to load on IPv6 (bsc#1231910). - CVE-2024-53124: net: fix data-races around sk->sk_forward_alloc (bsc#1234074). - CVE-2024-53139: sctp: fix possible UAF in sctp_v6_available() (bsc#1234157). - CVE-2024-58018: nvkm: correctly calculate the available space of the GSP cmdq buffer (bsc#1238990). - CVE-2024-58071: team: prevent adding a device which is already a team device lower (bsc#1238970). - CVE-2025-21729: wifi: rtw89: fix race between cancel_hw_scan and hw_scan completion (bsc#1237874). - CVE-2025-21755: vsock: Orphan socket after transport release (bsc#1237882). - CVE-2025-21806: net: let net.core.dev_weight always be non-zero (bsc#1238746). - CVE-2025-21836: io_uring/kbuf: reallocate buf lists on upgrade (bsc#1239066). - CVE-2025-21863: io_uring: prevent opcode speculation (bsc#1239475). - CVE-2025-21873: scsi: ufs: core: bsg: Fix crash when arpmb command fails (bsc#1240184). - CVE-2025-21875: mptcp: always handle address removal under msk socket lock (bsc#1240168). - CVE-2025-21881: uprobes: Reject the shared zeropage in uprobe_write_opcode() (bsc#1240185). - CVE-2025-21884: net: better track kernel sockets lifetime (bsc#1240171). - CVE-2025-21887: ovl: fix UAF in ovl_dentry_update_reval by moving dput() in ovl_link_up (bsc#1240176). - CVE-2025-21889: perf/core: Add RCU read lock protection to perf_iterate_ctx() (bsc#1240167). - CVE-2025-21894: net: enetc: VFs do not support HWTSTAMP_TX_ONESTEP_SYNC (bsc#1240581). - CVE-2025-21895: perf/core: Order the PMU list to fix warning about unordered pmu_ctx_list (bsc#1240585). - CVE-2025-21906: wifi: iwlwifi: mvm: clean up ROC on failure (bsc#1240587). - CVE-2025-21908: NFS: fix nfs_release_folio() to not deadlock via kcompactd writeback (bsc#1240600). - CVE-2025-21913: x86/amd_nb: Use rdmsr_safe() in amd_get_mmconfig_range() (bsc#1240591). - CVE-2025-21922: ppp: Fix KMSAN uninit-value warning with bpf (bsc#1240639). - CVE-2025-21924: net: hns3: make sure ptp clock is unregister and freed if hclge_ptp_get_cycle returns an error (bsc#1240720). - CVE-2025-21957: scsi: qla1280: Fix kernel oops when debug level > 2 (bsc#1240742). - CVE-2025-21960: eth: bnxt: do not update checksum in bnxt_xdp_build_skb() (bsc#1240815). - CVE-2025-21961: eth: bnxt: fix truesize for mb-xdp-pass case (bsc#1240816). - CVE-2025-21969: kABI workaround for l2cap_conn changes (bsc#1240784). - CVE-2025-21970: net/mlx5: Bridge, fix the crash caused by LAG state check (bsc#1240819). - CVE-2025-21972: net: mctp: unshare packets when reassembling (bsc#1240813). - CVE-2025-21975: net/mlx5: handle errors in mlx5_chains_create_table() (bsc#1240812). - CVE-2025-21981: ice: fix memory leak in aRFS after reset (bsc#1240612). - CVE-2025-21991: x86/microcode/AMD: Fix out-of-bounds on systems with CPU-less NUMA nodes (bsc#1240795). - CVE-2025-21993: iscsi_ibft: Fix UBSAN shift-out-of-bounds warning in ibft_attr_show_nic() (bsc#1240797). - CVE-2025-2312: CIFS: New mount option for cifs.upcall namespace resolution (bsc#1239684). The following non-security bugs were fixed: - ACPI: resource: Skip IRQ override on ASUS Vivobook 14 X1404VAP (stable-fixes). - ACPI: x86: Extend Lenovo Yoga Tab 3 quirk with skip GPIO event-handlers (git-fixes). - ALSA: hda/realtek: Fix built-in mic breakage on ASUS VivoBook X515JA (git-fixes). - ALSA: hda/realtek: Fix built-in mic on another ASUS VivoBook model (git-fixes). - ASoC: imx-card: Add NULL check in imx_card_probe() (git-fixes). - ASoC: qdsp6: q6apm-dai: fix capture pipeline overruns (git-fixes). - ASoC: qdsp6: q6apm-dai: set 10 ms period and buffer alignment (git-fixes). - ASoC: qdsp6: q6asm-dai: fix q6asm_dai_compr_set_params error path (git-fixes). - HID: hid-plantronics: Add mic mute mapping and generalize quirks (stable-fixes). - HID: i2c-hid: improve i2c_hid_get_report error message (stable-fixes). - Input: pm8941-pwrkey - fix dev_dbg() output in pm8941_pwrkey_irq() (git-fixes). - Input: synaptics - hide unused smbus_pnp_ids[] array (git-fixes). - PCI: Fix BAR resizing when VF BARs are assigned (git-fixes). - PCI: Fix reference leak in pci_register_host_bridge() (git-fixes). - PCI: histb: Fix an error handling path in histb_pcie_probe() (git-fixes). - acpi: nfit: fix narrowing conversion in acpi_nfit_ctl (git-fixes). - affs: do not write overlarge OFS data block size fields (git-fixes). - affs: generate OFS sequence numbers starting at 1 (git-fixes). - arch_topology: Make register_cpu_capacity_sysctl() tolerant to late (bsc#1238052) - arch_topology: init capacity_freq_ref to 0 (bsc#1238052) - arm64/amu: Use capacity_ref_freq() to set AMU ratio (bsc#1238052) - arm64: Do not call NULL in do_compat_alignment_fixup() (git-fixes) - arm64: Provide an AMU-based version of arch_freq_get_on_cpu (bsc#1238052) - arm64: Update AMU-based freq scale factor on entering idle (bsc#1238052) - arm64: Utilize for_each_cpu_wrap for reference lookup (bsc#1238052) - arm64: amu: Delay allocating cpumask for AMU FIE support (bsc#1238052) - arm64: mm: Correct the update of max_pfn (git-fixes) - bpf: Check size for BTF-based ctx access of pointer members (git-fixes). - bpf: Fix theoretical prog_array UAF in __uprobe_perf_func() (git-fixes). - bpf: avoid holding freeze_mutex during mmap operation (git-fixes). - bpf: fix potential error return (git-fixes). - bpf: unify VM_WRITE vs VM_MAYWRITE use in BPF map mmaping logic (git-fixes). - counter: fix privdata alignment (git-fixes). - counter: microchip-tcb-capture: Fix undefined counter channel state on probe (git-fixes). - counter: stm32-lptimer-cnt: fix error handling when enabling (git-fixes). - cpufreq/cppc: Set the frequency used for computing the capacity (bsc#1238052) - cpufreq: Allow arch_freq_get_on_cpu to return an error (bsc#1238052) - cpufreq: Introduce an optional cpuinfo_avg_freq sysfs entry (bsc#1238052) Keep the feature disabled by default on x86_64 - drm/amd/pm/smu11: Prevent division by zero (git-fixes). - drm/amd/pm: Prevent division by zero (git-fixes). - drm/amd: Keep display off while going into S4 (stable-fixes). - drm/amdgpu/dma_buf: fix page_link check (git-fixes). - drm/amdgpu/gfx11: fix num_mec (git-fixes). - drm/dp_mst: Add a helper to queue a topology probe (stable-fixes). - drm/dp_mst: Factor out function to queue a topology probe work (stable-fixes). - drm/i915/huc: Fix fence not released on early probe errors (git-fixes). - drm/nouveau: prime: fix ttm_bo_delayed_delete oops (git-fixes). - drm/sti: remove duplicate object names (git-fixes). - exfat: fix the infinite loop in exfat_find_last_cluster() (git-fixes). - firmware: cs_dsp: Ensure cs_dsp_load[_coeff]() returns 0 on success (git-fixes). - gpio: tegra186: fix resource handling in ACPI probe path (git-fixes). - hwmon: (nct6775-core) Fix out of bounds access for NCT679{8,9} (stable-fixes). - lib: scatterlist: fix sg_split_phys to preserve original scatterlist offsets (git-fixes). - libperf cpumap: Be tolerant of newline at the end of a cpumask (bsc#1234698 jsc#PED-12309). - libperf cpumap: Ensure empty cpumap is NULL from alloc (bsc#1234698 jsc#PED-12309). - libperf cpumap: Grow array of read CPUs in smaller increments (bsc#1234698 jsc#PED-12309). - libperf cpumap: Hide/reduce scope of MAX_NR_CPUS (bsc#1234698 jsc#PED-12309). - libperf cpumap: Remove use of perf_cpu_map__read() (bsc#1234698 jsc#PED-12309). - libperf cpumap: Rename perf_cpu_map__default_new() to perf_cpu_map__new_online_cpus() and prefer sysfs (bsc#1234698 jsc#PED-12309). - libperf cpumap: Rename perf_cpu_map__dummy_new() to perf_cpu_map__new_any_cpu() (bsc#1234698 jsc#PED-12309). - libperf cpumap: Rename perf_cpu_map__empty() to perf_cpu_map__has_any_cpu_or_is_empty() (bsc#1234698 jsc#PED-12309). - mmc: sdhci-pxav3: set NEED_RSP_BUSY capability (stable-fixes). - mtd: inftlcore: Add error check for inftl_read_oob() (git-fixes). - mtd: rawnand: Add status chack in r852_ready() (git-fixes). - net: usb: qmi_wwan: add Telit Cinterion FE990B composition (stable-fixes). - net: usb: qmi_wwan: add Telit Cinterion FN990B composition (stable-fixes). - nfs: clear SB_RDONLY before getting superblock (bsc#1238565). - nfs: ignore SB_RDONLY when remounting nfs (bsc#1238565). - nfsd: put dl_stid if fail to queue dl_recall (git-fixes). - ntb: Force physically contiguous allocation of rx ring buffers (git-fixes). - ntb: intel: Fix using link status DB's (git-fixes). - ntb: use 64-bit arithmetic for the MSI doorbell mask (git-fixes). - ntb_hw_switchtec: Fix shift-out-of-bounds in switchtec_ntb_mw_set_trans (git-fixes). - ntb_perf: Delete duplicate dmaengine_unmap_put() call in perf_copy_chunk() (git-fixes). - ntb_perf: Fix printk format (git-fixes). - objtool, media: dib8000: Prevent divide-by-zero in dib8000_set_dds() (git-fixes). - objtool, spi: amd: Fix out-of-bounds stack access in amd_set_spi_freq() (git-fixes). - objtool: Fix segfault in ignore_unreachable_insn() (git-fixes). - perf cpumap: Reduce transitive dependencies on libperf MAX_NR_CPUS (bsc#1234698 jsc#PED-12309). - perf pmu: Remove use of perf_cpu_map__read() (bsc#1234698 jsc#PED-12309). - perf tools: annotate asm_pure_loop.S (bsc#1239906). - perf: Increase MAX_NR_CPUS to 4096 (bsc#1234698 jsc#PED-12309). - platform/x86/intel/vsec: Add Diamond Rapids support (stable-fixes). - platform/x86: ISST: Correct command storage data length (git-fixes). - platform/x86: intel-hid: fix volume buttons on Microsoft Surface Go 4 tablet (stable-fixes). - powercap: dtpm_devfreq: Fix error check against dev_pm_qos_add_request() (git-fixes). - powercap: intel_rapl_tpmi: Fix System Domain probing (git-fixes). - powercap: intel_rapl_tpmi: Fix bogus register reading (git-fixes). - powercap: intel_rapl_tpmi: Ignore minor version change (git-fixes). - rtnetlink: Allocate vfinfo size for VF GUIDs when supported (bsc#1224013). - s390/cio: Fix CHPID "configure" attribute caching (git-fixes bsc#1240979). - s390/pci: Fix zpci_bus_is_isolated_vf() for non-VFs (git-fixes bsc#1240978). - sched/topology: Add a new arch_scale_freq_ref() method (bsc#1238052) - security, lsm: Introduce security_mptcp_add_subflow() (bsc#1240375). - selftests/bpf: Add test for narrow ctx load for pointer args (git-fixes). - selinux: Implement mptcp_add_subflow hook (bsc#1240375). - serial: 8250_dma: terminate correct DMA in tx_dma_flush() (git-fixes). - smb: client: fix open_cached_dir retries with 'hard' mount option (bsc#1240616). - staging: rtl8723bs: select CONFIG_CRYPTO_LIB_AES (git-fixes). - topology: Set capacity_freq_ref in all cases (bsc#1238052) - tpm, tpm_tis: Workaround failed command reception on Infineon devices (bsc#1235870). - tpm: tis: Double the timeout B to 4s (bsc#1235870). - tpm_tis: Move CRC check to generic send routine (bsc#1235870). - tpm_tis: Use responseRetry to recover from data transfer errors (bsc#1235870). - tty: serial: 8250: Add Brainboxes XC devices (stable-fixes). - tty: serial: 8250: Add some more device IDs (stable-fixes). - tty: serial: fsl_lpuart: disable transmitter before changing RS485 related registers (git-fixes). - tty: serial: lpuart: only disable CTS instead of overwriting the whole UARTMODIR register (git-fixes). - ucsi_ccg: Do not show failed to get FW build information error (git-fixes). - usb: dwc3: Set SUSPENDENABLE soon after phy init (git-fixes). - usb: xhci: correct debug message page size calculation (git-fixes). - usbnet:fix NPE during rx_complete (git-fixes). - wifi: ath11k: fix memory leak in ath11k_xxx_remove() (git-fixes). - wifi: brcmfmac: keep power during suspend if board requires it (stable-fixes). - wifi: iwlwifi: fw: allocate chained SG tables for dump (stable-fixes). - wifi: iwlwifi: mvm: use the right version of the rate API (stable-fixes). - wifi: mac80211: flush the station before moving it to UN-AUTHORIZED state (stable-fixes). - xhci: Fix null pointer dereference during S4 resume when resetting ep0 (bsc#1235550). - xhci: Reconfigure endpoint 0 max packet size only during endpoint reset (bsc#1235550). - xhci: fix possible null pointer deref during xhci urb enqueue (bsc#1235550).
Patchnames
SUSE-SLE-Micro-6.0-kernel-15
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).



{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for the Linux Kernel",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "\n\nThe SUSE Linux Enterprise Micro 6.0 and 6.1 RT kernel was updated to receive various security bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2024-27415: netfilter: br_netfilter: skip conntrack input hook for promisc packets (bsc#1224757).\n- CVE-2024-50038: netfilter: xtables: fix typo causing some targets not to load on IPv6 (bsc#1231910).\n- CVE-2024-53124: net: fix data-races around sk-\u003esk_forward_alloc (bsc#1234074).\n- CVE-2024-53139: sctp: fix possible UAF in sctp_v6_available() (bsc#1234157).\n- CVE-2024-58018: nvkm: correctly calculate the available space of the GSP cmdq buffer (bsc#1238990).\n- CVE-2024-58071: team: prevent adding a device which is already a team device lower (bsc#1238970).\n- CVE-2025-21729: wifi: rtw89: fix race between cancel_hw_scan and hw_scan completion (bsc#1237874).\n- CVE-2025-21755: vsock: Orphan socket after transport release (bsc#1237882).\n- CVE-2025-21806: net: let net.core.dev_weight always be non-zero (bsc#1238746).\n- CVE-2025-21836: io_uring/kbuf: reallocate buf lists on upgrade (bsc#1239066).\n- CVE-2025-21863: io_uring: prevent opcode speculation (bsc#1239475).\n- CVE-2025-21873: scsi: ufs: core: bsg: Fix crash when arpmb command fails (bsc#1240184).\n- CVE-2025-21875: mptcp: always handle address removal under msk socket lock (bsc#1240168).\n- CVE-2025-21881: uprobes: Reject the shared zeropage in uprobe_write_opcode() (bsc#1240185).\n- CVE-2025-21884: net: better track kernel sockets lifetime (bsc#1240171).\n- CVE-2025-21887: ovl: fix UAF in ovl_dentry_update_reval by moving dput() in ovl_link_up (bsc#1240176).\n- CVE-2025-21889: perf/core: Add RCU read lock protection to perf_iterate_ctx() (bsc#1240167).\n- CVE-2025-21894: net: enetc: VFs do not support HWTSTAMP_TX_ONESTEP_SYNC (bsc#1240581).\n- CVE-2025-21895: perf/core: Order the PMU list to fix warning about unordered pmu_ctx_list (bsc#1240585).\n- CVE-2025-21906: wifi: iwlwifi: mvm: clean up ROC on failure (bsc#1240587).\n- CVE-2025-21908: NFS: fix nfs_release_folio() to not deadlock via kcompactd writeback (bsc#1240600).\n- CVE-2025-21913: x86/amd_nb: Use rdmsr_safe() in amd_get_mmconfig_range() (bsc#1240591).\n- CVE-2025-21922: ppp: Fix KMSAN uninit-value warning with bpf (bsc#1240639).\n- CVE-2025-21924: net: hns3: make sure ptp clock is unregister and freed if hclge_ptp_get_cycle returns an error (bsc#1240720).\n- CVE-2025-21957: scsi: qla1280: Fix kernel oops when debug level \u003e 2 (bsc#1240742).\n- CVE-2025-21960: eth: bnxt: do not update checksum in bnxt_xdp_build_skb() (bsc#1240815).\n- CVE-2025-21961: eth: bnxt: fix truesize for mb-xdp-pass case (bsc#1240816).\n- CVE-2025-21969: kABI workaround for l2cap_conn changes (bsc#1240784).\n- CVE-2025-21970: net/mlx5: Bridge, fix the crash caused by LAG state check (bsc#1240819).\n- CVE-2025-21972: net: mctp: unshare packets when reassembling (bsc#1240813).\n- CVE-2025-21975: net/mlx5: handle errors in mlx5_chains_create_table() (bsc#1240812).\n- CVE-2025-21981: ice: fix memory leak in aRFS after reset (bsc#1240612).\n- CVE-2025-21991: x86/microcode/AMD: Fix out-of-bounds on systems with CPU-less NUMA nodes (bsc#1240795).\n- CVE-2025-21993: iscsi_ibft: Fix UBSAN shift-out-of-bounds warning in ibft_attr_show_nic() (bsc#1240797).\n- CVE-2025-2312: CIFS: New mount option for cifs.upcall namespace resolution (bsc#1239684).\n\nThe following non-security bugs were fixed:\n\n- ACPI: resource: Skip IRQ override on ASUS Vivobook 14 X1404VAP (stable-fixes).\n- ACPI: x86: Extend Lenovo Yoga Tab 3 quirk with skip GPIO event-handlers (git-fixes).\n- ALSA: hda/realtek: Fix built-in mic breakage on ASUS VivoBook X515JA (git-fixes).\n- ALSA: hda/realtek: Fix built-in mic on another ASUS VivoBook model (git-fixes).\n- ASoC: imx-card: Add NULL check in imx_card_probe() (git-fixes).\n- ASoC: qdsp6: q6apm-dai: fix capture pipeline overruns (git-fixes).\n- ASoC: qdsp6: q6apm-dai: set 10 ms period and buffer alignment (git-fixes).\n- ASoC: qdsp6: q6asm-dai: fix q6asm_dai_compr_set_params error path (git-fixes).\n- HID: hid-plantronics: Add mic mute mapping and generalize quirks (stable-fixes).\n- HID: i2c-hid: improve i2c_hid_get_report error message (stable-fixes).\n- Input: pm8941-pwrkey - fix dev_dbg() output in pm8941_pwrkey_irq() (git-fixes).\n- Input: synaptics - hide unused smbus_pnp_ids[] array (git-fixes).\n- PCI: Fix BAR resizing when VF BARs are assigned (git-fixes).\n- PCI: Fix reference leak in pci_register_host_bridge() (git-fixes).\n- PCI: histb: Fix an error handling path in histb_pcie_probe() (git-fixes).\n- acpi: nfit: fix narrowing conversion in acpi_nfit_ctl (git-fixes).\n- affs: do not write overlarge OFS data block size fields (git-fixes).\n- affs: generate OFS sequence numbers starting at 1 (git-fixes).\n- arch_topology: Make register_cpu_capacity_sysctl() tolerant to late (bsc#1238052)\n- arch_topology: init capacity_freq_ref to 0 (bsc#1238052)\n- arm64/amu: Use capacity_ref_freq() to set AMU ratio (bsc#1238052)\n- arm64: Do not call NULL in do_compat_alignment_fixup() (git-fixes)\n- arm64: Provide an AMU-based version of arch_freq_get_on_cpu (bsc#1238052)\n- arm64: Update AMU-based freq scale factor on entering idle (bsc#1238052)\n- arm64: Utilize for_each_cpu_wrap for reference lookup (bsc#1238052)\n- arm64: amu: Delay allocating cpumask for AMU FIE support (bsc#1238052)\n- arm64: mm: Correct the update of max_pfn (git-fixes)\n- bpf: Check size for BTF-based ctx access of pointer members (git-fixes).\n- bpf: Fix theoretical prog_array UAF in __uprobe_perf_func() (git-fixes).\n- bpf: avoid holding freeze_mutex during mmap operation (git-fixes).\n- bpf: fix potential error return (git-fixes).\n- bpf: unify VM_WRITE vs VM_MAYWRITE use in BPF map mmaping logic (git-fixes).\n- counter: fix privdata alignment (git-fixes).\n- counter: microchip-tcb-capture: Fix undefined counter channel state on probe (git-fixes).\n- counter: stm32-lptimer-cnt: fix error handling when enabling (git-fixes).\n- cpufreq/cppc: Set the frequency used for computing the capacity (bsc#1238052)\n- cpufreq: Allow arch_freq_get_on_cpu to return an error (bsc#1238052)\n- cpufreq: Introduce an optional cpuinfo_avg_freq sysfs entry (bsc#1238052)\n  Keep the feature disabled by default on x86_64\n- drm/amd/pm/smu11: Prevent division by zero (git-fixes).\n- drm/amd/pm: Prevent division by zero (git-fixes).\n- drm/amd: Keep display off while going into S4 (stable-fixes).\n- drm/amdgpu/dma_buf: fix page_link check (git-fixes).\n- drm/amdgpu/gfx11: fix num_mec (git-fixes).\n- drm/dp_mst: Add a helper to queue a topology probe (stable-fixes).\n- drm/dp_mst: Factor out function to queue a topology probe work (stable-fixes).\n- drm/i915/huc: Fix fence not released on early probe errors (git-fixes).\n- drm/nouveau: prime: fix ttm_bo_delayed_delete oops (git-fixes).\n- drm/sti: remove duplicate object names (git-fixes).\n- exfat: fix the infinite loop in exfat_find_last_cluster() (git-fixes).\n- firmware: cs_dsp: Ensure cs_dsp_load[_coeff]() returns 0 on success (git-fixes).\n- gpio: tegra186: fix resource handling in ACPI probe path (git-fixes).\n- hwmon: (nct6775-core) Fix out of bounds access for NCT679{8,9} (stable-fixes).\n- lib: scatterlist: fix sg_split_phys to preserve original scatterlist offsets (git-fixes).\n- libperf cpumap: Be tolerant of newline at the end of a cpumask (bsc#1234698 jsc#PED-12309).\n- libperf cpumap: Ensure empty cpumap is NULL from alloc (bsc#1234698 jsc#PED-12309).\n- libperf cpumap: Grow array of read CPUs in smaller increments (bsc#1234698 jsc#PED-12309).\n- libperf cpumap: Hide/reduce scope of MAX_NR_CPUS (bsc#1234698 jsc#PED-12309).\n- libperf cpumap: Remove use of perf_cpu_map__read() (bsc#1234698 jsc#PED-12309).\n- libperf cpumap: Rename perf_cpu_map__default_new() to\n  perf_cpu_map__new_online_cpus() and prefer sysfs (bsc#1234698 jsc#PED-12309).\n- libperf cpumap: Rename perf_cpu_map__dummy_new() to perf_cpu_map__new_any_cpu() (bsc#1234698 jsc#PED-12309).\n- libperf cpumap: Rename perf_cpu_map__empty() to perf_cpu_map__has_any_cpu_or_is_empty() (bsc#1234698 jsc#PED-12309).\n- mmc: sdhci-pxav3: set NEED_RSP_BUSY capability (stable-fixes).\n- mtd: inftlcore: Add error check for inftl_read_oob() (git-fixes).\n- mtd: rawnand: Add status chack in r852_ready() (git-fixes).\n- net: usb: qmi_wwan: add Telit Cinterion FE990B composition (stable-fixes).\n- net: usb: qmi_wwan: add Telit Cinterion FN990B composition (stable-fixes).\n- nfs: clear SB_RDONLY before getting superblock (bsc#1238565).\n- nfs: ignore SB_RDONLY when remounting nfs (bsc#1238565).\n- nfsd: put dl_stid if fail to queue dl_recall (git-fixes).\n- ntb: Force physically contiguous allocation of rx ring buffers (git-fixes).\n- ntb: intel: Fix using link status DB\u0027s (git-fixes).\n- ntb: use 64-bit arithmetic for the MSI doorbell mask (git-fixes).\n- ntb_hw_switchtec: Fix shift-out-of-bounds in switchtec_ntb_mw_set_trans (git-fixes).\n- ntb_perf: Delete duplicate dmaengine_unmap_put() call in perf_copy_chunk() (git-fixes).\n- ntb_perf: Fix printk format (git-fixes).\n- objtool, media: dib8000: Prevent divide-by-zero in dib8000_set_dds() (git-fixes).\n- objtool, spi: amd: Fix out-of-bounds stack access in amd_set_spi_freq() (git-fixes).\n- objtool: Fix segfault in ignore_unreachable_insn() (git-fixes).\n- perf cpumap: Reduce transitive dependencies on libperf MAX_NR_CPUS (bsc#1234698 jsc#PED-12309).\n- perf pmu: Remove use of perf_cpu_map__read() (bsc#1234698 jsc#PED-12309).\n- perf tools: annotate asm_pure_loop.S (bsc#1239906).\n- perf: Increase MAX_NR_CPUS to 4096 (bsc#1234698 jsc#PED-12309).\n- platform/x86/intel/vsec: Add Diamond Rapids support (stable-fixes).\n- platform/x86: ISST: Correct command storage data length (git-fixes).\n- platform/x86: intel-hid: fix volume buttons on Microsoft Surface Go 4 tablet (stable-fixes).\n- powercap: dtpm_devfreq: Fix error check against dev_pm_qos_add_request() (git-fixes).\n- powercap: intel_rapl_tpmi: Fix System Domain probing (git-fixes).\n- powercap: intel_rapl_tpmi: Fix bogus register reading (git-fixes).\n- powercap: intel_rapl_tpmi: Ignore minor version change (git-fixes).\n- rtnetlink: Allocate vfinfo size for VF GUIDs when supported (bsc#1224013).\n- s390/cio: Fix CHPID \"configure\" attribute caching (git-fixes bsc#1240979).\n- s390/pci: Fix zpci_bus_is_isolated_vf() for non-VFs (git-fixes bsc#1240978).\n- sched/topology: Add a new arch_scale_freq_ref() method (bsc#1238052)\n- security, lsm: Introduce security_mptcp_add_subflow() (bsc#1240375).\n- selftests/bpf: Add test for narrow ctx load for pointer args (git-fixes).\n- selinux: Implement mptcp_add_subflow hook (bsc#1240375).\n- serial: 8250_dma: terminate correct DMA in tx_dma_flush() (git-fixes).\n- smb: client: fix open_cached_dir retries with \u0027hard\u0027 mount option (bsc#1240616).\n- staging: rtl8723bs: select CONFIG_CRYPTO_LIB_AES (git-fixes).\n- topology: Set capacity_freq_ref in all cases (bsc#1238052)\n- tpm, tpm_tis: Workaround failed command reception on Infineon devices (bsc#1235870).\n- tpm: tis: Double the timeout B to 4s (bsc#1235870).\n- tpm_tis: Move CRC check to generic send routine (bsc#1235870).\n- tpm_tis: Use responseRetry to recover from data transfer errors (bsc#1235870).\n- tty: serial: 8250: Add Brainboxes XC devices (stable-fixes).\n- tty: serial: 8250: Add some more device IDs (stable-fixes).\n- tty: serial: fsl_lpuart: disable transmitter before changing RS485 related registers (git-fixes).\n- tty: serial: lpuart: only disable CTS instead of overwriting the whole UARTMODIR register (git-fixes).\n- ucsi_ccg: Do not show failed to get FW build information error (git-fixes).\n- usb: dwc3: Set SUSPENDENABLE soon after phy init (git-fixes).\n- usb: xhci: correct debug message page size calculation (git-fixes).\n- usbnet:fix NPE during rx_complete (git-fixes).\n- wifi: ath11k: fix memory leak in ath11k_xxx_remove() (git-fixes).\n- wifi: brcmfmac: keep power during suspend if board requires it (stable-fixes).\n- wifi: iwlwifi: fw: allocate chained SG tables for dump (stable-fixes).\n- wifi: iwlwifi: mvm: use the right version of the rate API (stable-fixes).\n- wifi: mac80211: flush the station before moving it to UN-AUTHORIZED state (stable-fixes).\n- xhci: Fix null pointer dereference during S4 resume when resetting ep0 (bsc#1235550).\n- xhci: Reconfigure endpoint 0 max packet size only during endpoint reset (bsc#1235550).\n- xhci: fix possible null pointer deref during xhci urb enqueue (bsc#1235550).\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-SLE-Micro-6.0-kernel-15",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_20206-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2025:20206-1",
        "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202520206-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2025:20206-1",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021137.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224013",
        "url": "https://bugzilla.suse.com/1224013"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224757",
        "url": "https://bugzilla.suse.com/1224757"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1228659",
        "url": "https://bugzilla.suse.com/1228659"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1231910",
        "url": "https://bugzilla.suse.com/1231910"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1234074",
        "url": "https://bugzilla.suse.com/1234074"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1234157",
        "url": "https://bugzilla.suse.com/1234157"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1234698",
        "url": "https://bugzilla.suse.com/1234698"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1235550",
        "url": "https://bugzilla.suse.com/1235550"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1235870",
        "url": "https://bugzilla.suse.com/1235870"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1237874",
        "url": "https://bugzilla.suse.com/1237874"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1237882",
        "url": "https://bugzilla.suse.com/1237882"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238052",
        "url": "https://bugzilla.suse.com/1238052"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238565",
        "url": "https://bugzilla.suse.com/1238565"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238746",
        "url": "https://bugzilla.suse.com/1238746"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238970",
        "url": "https://bugzilla.suse.com/1238970"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238990",
        "url": "https://bugzilla.suse.com/1238990"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1239066",
        "url": "https://bugzilla.suse.com/1239066"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1239475",
        "url": "https://bugzilla.suse.com/1239475"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1239684",
        "url": "https://bugzilla.suse.com/1239684"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1239906",
        "url": "https://bugzilla.suse.com/1239906"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1239925",
        "url": "https://bugzilla.suse.com/1239925"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1240167",
        "url": "https://bugzilla.suse.com/1240167"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1240168",
        "url": "https://bugzilla.suse.com/1240168"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1240171",
        "url": "https://bugzilla.suse.com/1240171"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1240176",
        "url": "https://bugzilla.suse.com/1240176"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1240184",
        "url": "https://bugzilla.suse.com/1240184"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1240185",
        "url": "https://bugzilla.suse.com/1240185"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1240375",
        "url": "https://bugzilla.suse.com/1240375"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1240575",
        "url": "https://bugzilla.suse.com/1240575"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1240581",
        "url": "https://bugzilla.suse.com/1240581"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1240582",
        "url": "https://bugzilla.suse.com/1240582"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1240583",
        "url": "https://bugzilla.suse.com/1240583"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1240584",
        "url": "https://bugzilla.suse.com/1240584"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1240585",
        "url": "https://bugzilla.suse.com/1240585"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1240587",
        "url": "https://bugzilla.suse.com/1240587"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1240590",
        "url": "https://bugzilla.suse.com/1240590"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1240591",
        "url": "https://bugzilla.suse.com/1240591"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1240592",
        "url": "https://bugzilla.suse.com/1240592"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1240594",
        "url": "https://bugzilla.suse.com/1240594"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1240595",
        "url": "https://bugzilla.suse.com/1240595"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1240596",
        "url": "https://bugzilla.suse.com/1240596"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1240600",
        "url": "https://bugzilla.suse.com/1240600"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1240612",
        "url": "https://bugzilla.suse.com/1240612"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1240616",
        "url": "https://bugzilla.suse.com/1240616"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1240639",
        "url": "https://bugzilla.suse.com/1240639"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1240643",
        "url": "https://bugzilla.suse.com/1240643"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1240647",
        "url": "https://bugzilla.suse.com/1240647"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1240691",
        "url": "https://bugzilla.suse.com/1240691"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1240700",
        "url": "https://bugzilla.suse.com/1240700"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1240701",
        "url": "https://bugzilla.suse.com/1240701"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1240703",
        "url": "https://bugzilla.suse.com/1240703"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1240708",
        "url": "https://bugzilla.suse.com/1240708"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1240714",
        "url": "https://bugzilla.suse.com/1240714"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1240715",
        "url": "https://bugzilla.suse.com/1240715"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1240716",
        "url": "https://bugzilla.suse.com/1240716"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1240718",
        "url": "https://bugzilla.suse.com/1240718"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1240719",
        "url": "https://bugzilla.suse.com/1240719"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1240720",
        "url": "https://bugzilla.suse.com/1240720"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1240722",
        "url": "https://bugzilla.suse.com/1240722"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1240727",
        "url": "https://bugzilla.suse.com/1240727"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1240739",
        "url": "https://bugzilla.suse.com/1240739"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1240742",
        "url": "https://bugzilla.suse.com/1240742"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1240779",
        "url": "https://bugzilla.suse.com/1240779"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1240783",
        "url": "https://bugzilla.suse.com/1240783"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1240784",
        "url": "https://bugzilla.suse.com/1240784"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1240795",
        "url": "https://bugzilla.suse.com/1240795"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1240796",
        "url": "https://bugzilla.suse.com/1240796"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1240797",
        "url": "https://bugzilla.suse.com/1240797"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1240799",
        "url": "https://bugzilla.suse.com/1240799"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1240801",
        "url": "https://bugzilla.suse.com/1240801"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1240806",
        "url": "https://bugzilla.suse.com/1240806"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1240808",
        "url": "https://bugzilla.suse.com/1240808"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1240812",
        "url": "https://bugzilla.suse.com/1240812"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1240813",
        "url": "https://bugzilla.suse.com/1240813"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1240815",
        "url": "https://bugzilla.suse.com/1240815"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1240816",
        "url": "https://bugzilla.suse.com/1240816"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1240819",
        "url": "https://bugzilla.suse.com/1240819"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1240821",
        "url": "https://bugzilla.suse.com/1240821"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1240825",
        "url": "https://bugzilla.suse.com/1240825"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1240829",
        "url": "https://bugzilla.suse.com/1240829"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1240873",
        "url": "https://bugzilla.suse.com/1240873"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1240937",
        "url": "https://bugzilla.suse.com/1240937"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1240938",
        "url": "https://bugzilla.suse.com/1240938"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1240940",
        "url": "https://bugzilla.suse.com/1240940"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1240942",
        "url": "https://bugzilla.suse.com/1240942"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1240943",
        "url": "https://bugzilla.suse.com/1240943"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1240978",
        "url": "https://bugzilla.suse.com/1240978"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1240979",
        "url": "https://bugzilla.suse.com/1240979"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1241038",
        "url": "https://bugzilla.suse.com/1241038"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-27415 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-27415/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-50038 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-50038/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-53124 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-53124/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-53139 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-53139/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-58018 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-58018/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-58071 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-58071/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21729 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21729/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21755 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21755/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21806 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21806/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21836 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21836/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21863 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21863/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21873 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21873/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21875 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21875/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21881 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21881/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21884 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21884/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21887 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21887/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21889 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21889/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21894 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21894/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21895 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21895/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21905 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21905/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21906 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21906/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21908 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21908/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21909 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21909/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21910 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21910/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21912 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21912/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21913 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21913/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21914 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21914/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21915 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21915/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21916 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21916/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21917 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21917/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21918 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21918/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21922 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21922/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21923 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21923/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21924 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21924/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21927 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21927/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21928 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21928/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21930 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21930/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21934 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21934/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21935 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21935/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21936 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21936/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21937 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21937/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21941 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21941/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21943 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21943/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21948 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21948/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21950 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21950/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21951 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21951/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21953 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21953/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21956 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21956/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21957 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21957/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21960 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21960/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21961 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21961/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21966 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21966/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21968 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21968/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21969 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21969/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21970 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21970/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21971 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21971/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21972 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21972/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21975 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21975/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21978 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21978/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21979 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21979/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21981 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21981/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21991 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21991/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21992 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21992/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21993 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21993/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21995 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21995/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21996 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21996/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-22001 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-22001/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-22003 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-22003/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-22007 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-22007/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-22008 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-22008/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-22009 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-22009/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-22010 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-22010/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-22013 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-22013/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-22014 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-22014/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-2312 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-2312/"
      }
    ],
    "title": "Security update for the Linux Kernel",
    "tracking": {
      "current_release_date": "2025-04-25T09:37:28Z",
      "generator": {
        "date": "2025-04-25T09:37:28Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2025:20206-1",
      "initial_release_date": "2025-04-25T09:37:28Z",
      "revision_history": [
        {
          "date": "2025-04-25T09:37:28Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-rt-6.4.0-30.1.noarch",
                "product": {
                  "name": "kernel-devel-rt-6.4.0-30.1.noarch",
                  "product_id": "kernel-devel-rt-6.4.0-30.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-rt-6.4.0-30.1.noarch",
                "product": {
                  "name": "kernel-source-rt-6.4.0-30.1.noarch",
                  "product_id": "kernel-source-rt-6.4.0-30.1.noarch"
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
                "product": {
                  "name": "kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
                  "product_id": "kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-6.4.0-30.1.x86_64",
                "product": {
                  "name": "kernel-rt-6.4.0-30.1.x86_64",
                  "product_id": "kernel-rt-6.4.0-30.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-livepatch-6.4.0-30.1.x86_64",
                "product": {
                  "name": "kernel-rt-livepatch-6.4.0-30.1.x86_64",
                  "product_id": "kernel-rt-livepatch-6.4.0-30.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Micro 6.0",
                "product": {
                  "name": "SUSE Linux Micro 6.0",
                  "product_id": "SUSE Linux Micro 6.0",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sl-micro:6.0"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-rt-6.4.0-30.1.noarch as component of SUSE Linux Micro 6.0",
          "product_id": "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch"
        },
        "product_reference": "kernel-devel-rt-6.4.0-30.1.noarch",
        "relates_to_product_reference": "SUSE Linux Micro 6.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64 as component of SUSE Linux Micro 6.0",
          "product_id": "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64"
        },
        "product_reference": "kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
        "relates_to_product_reference": "SUSE Linux Micro 6.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-6.4.0-30.1.x86_64 as component of SUSE Linux Micro 6.0",
          "product_id": "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64"
        },
        "product_reference": "kernel-rt-6.4.0-30.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Micro 6.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-livepatch-6.4.0-30.1.x86_64 as component of SUSE Linux Micro 6.0",
          "product_id": "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64"
        },
        "product_reference": "kernel-rt-livepatch-6.4.0-30.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Micro 6.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-rt-6.4.0-30.1.noarch as component of SUSE Linux Micro 6.0",
          "product_id": "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
        },
        "product_reference": "kernel-source-rt-6.4.0-30.1.noarch",
        "relates_to_product_reference": "SUSE Linux Micro 6.0"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-27415",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-27415"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: bridge: confirm multicast packets before passing them up the stack\n\nconntrack nf_confirm logic cannot handle cloned skbs referencing\nthe same nf_conn entry, which will happen for multicast (broadcast)\nframes on bridges.\n\n Example:\n    macvlan0\n       |\n      br0\n     /  \\\n  ethX    ethY\n\n ethX (or Y) receives a L2 multicast or broadcast packet containing\n an IP packet, flow is not yet in conntrack table.\n\n 1. skb passes through bridge and fake-ip (br_netfilter)Prerouting.\n    -\u003e skb-\u003e_nfct now references a unconfirmed entry\n 2. skb is broad/mcast packet. bridge now passes clones out on each bridge\n    interface.\n 3. skb gets passed up the stack.\n 4. In macvlan case, macvlan driver retains clone(s) of the mcast skb\n    and schedules a work queue to send them out on the lower devices.\n\n    The clone skb-\u003e_nfct is not a copy, it is the same entry as the\n    original skb.  The macvlan rx handler then returns RX_HANDLER_PASS.\n 5. Normal conntrack hooks (in NF_INET_LOCAL_IN) confirm the orig skb.\n\nThe Macvlan broadcast worker and normal confirm path will race.\n\nThis race will not happen if step 2 already confirmed a clone. In that\ncase later steps perform skb_clone() with skb-\u003e_nfct already confirmed (in\nhash table).  This works fine.\n\nBut such confirmation won\u0027t happen when eb/ip/nftables rules dropped the\npackets before they reached the nf_confirm step in postrouting.\n\nPablo points out that nf_conntrack_bridge doesn\u0027t allow use of stateful\nnat, so we can safely discard the nf_conn entry and let inet call\nconntrack again.\n\nThis doesn\u0027t work for bridge netfilter: skb could have a nat\ntransformation. Also bridge nf prevents re-invocation of inet prerouting\nvia \u0027sabotage_in\u0027 hook.\n\nWork around this problem by explicit confirmation of the entry at LOCAL_IN\ntime, before upper layer has a chance to clone the unconfirmed entry.\n\nThe downside is that this disables NAT and conntrack helpers.\n\nAlternative fix would be to add locking to all code parts that deal with\nunconfirmed packets, but even if that could be done in a sane way this\nopens up other problems, for example:\n\n-m physdev --physdev-out eth0 -j SNAT --snat-to 1.2.3.4\n-m physdev --physdev-out eth1 -j SNAT --snat-to 1.2.3.5\n\nFor multicast case, only one of such conflicting mappings will be\ncreated, conntrack only handles 1:1 NAT mappings.\n\nUsers should set create a setup that explicitly marks such traffic\nNOTRACK (conntrack bypass) to avoid this, but we cannot auto-bypass\nthem, ruleset might have accept rules for untracked traffic already,\nso user-visible behaviour would change.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
          "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-27415",
          "url": "https://www.suse.com/security/cve/CVE-2024-27415"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224757 for CVE-2024-27415",
          "url": "https://bugzilla.suse.com/1224757"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-25T09:37:28Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-27415"
    },
    {
      "cve": "CVE-2024-50038",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-50038"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: xtables: avoid NFPROTO_UNSPEC where needed\n\nsyzbot managed to call xt_cluster match via ebtables:\n\n WARNING: CPU: 0 PID: 11 at net/netfilter/xt_cluster.c:72 xt_cluster_mt+0x196/0x780\n [..]\n ebt_do_table+0x174b/0x2a40\n\nModule registers to NFPROTO_UNSPEC, but it assumes ipv4/ipv6 packet\nprocessing.  As this is only useful to restrict locally terminating\nTCP/UDP traffic, register this for ipv4 and ipv6 family only.\n\nPablo points out that this is a general issue, direct users of the\nset/getsockopt interface can call into targets/matches that were only\nintended for use with ip(6)tables.\n\nCheck all UNSPEC matches and targets for similar issues:\n\n- matches and targets are fine except if they assume skb_network_header()\n  is valid -- this is only true when called from inet layer: ip(6) stack\n  pulls the ip/ipv6 header into linear data area.\n- targets that return XT_CONTINUE or other xtables verdicts must be\n  restricted too, they are incompatbile with the ebtables traverser, e.g.\n  EBT_CONTINUE is a completely different value than XT_CONTINUE.\n\nMost matches/targets are changed to register for NFPROTO_IPV4/IPV6, as\nthey are provided for use by ip(6)tables.\n\nThe MARK target is also used by arptables, so register for NFPROTO_ARP too.\n\nWhile at it, bail out if connbytes fails to enable the corresponding\nconntrack family.\n\nThis change passes the selftests in iptables.git.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
          "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-50038",
          "url": "https://www.suse.com/security/cve/CVE-2024-50038"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1231910 for CVE-2024-50038",
          "url": "https://bugzilla.suse.com/1231910"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-25T09:37:28Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-50038"
    },
    {
      "cve": "CVE-2024-53124",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-53124"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: fix data-races around sk-\u003esk_forward_alloc\n\nSyzkaller reported this warning:\n ------------[ cut here ]------------\n WARNING: CPU: 0 PID: 16 at net/ipv4/af_inet.c:156 inet_sock_destruct+0x1c5/0x1e0\n Modules linked in:\n CPU: 0 UID: 0 PID: 16 Comm: ksoftirqd/0 Not tainted 6.12.0-rc5 #26\n Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014\n RIP: 0010:inet_sock_destruct+0x1c5/0x1e0\n Code: 24 12 4c 89 e2 5b 48 c7 c7 98 ec bb 82 41 5c e9 d1 18 17 ff 4c 89 e6 5b 48 c7 c7 d0 ec bb 82 41 5c e9 bf 18 17 ff 0f 0b eb 83 \u003c0f\u003e 0b eb 97 0f 0b eb 87 0f 0b e9 68 ff ff ff 66 66 2e 0f 1f 84 00\n RSP: 0018:ffffc9000008bd90 EFLAGS: 00010206\n RAX: 0000000000000300 RBX: ffff88810b172a90 RCX: 0000000000000007\n RDX: 0000000000000002 RSI: 0000000000000300 RDI: ffff88810b172a00\n RBP: ffff88810b172a00 R08: ffff888104273c00 R09: 0000000000100007\n R10: 0000000000020000 R11: 0000000000000006 R12: ffff88810b172a00\n R13: 0000000000000004 R14: 0000000000000000 R15: ffff888237c31f78\n FS:  0000000000000000(0000) GS:ffff888237c00000(0000) knlGS:0000000000000000\n CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 00007ffc63fecac8 CR3: 000000000342e000 CR4: 00000000000006f0\n DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n Call Trace:\n  \u003cTASK\u003e\n  ? __warn+0x88/0x130\n  ? inet_sock_destruct+0x1c5/0x1e0\n  ? report_bug+0x18e/0x1a0\n  ? handle_bug+0x53/0x90\n  ? exc_invalid_op+0x18/0x70\n  ? asm_exc_invalid_op+0x1a/0x20\n  ? inet_sock_destruct+0x1c5/0x1e0\n  __sk_destruct+0x2a/0x200\n  rcu_do_batch+0x1aa/0x530\n  ? rcu_do_batch+0x13b/0x530\n  rcu_core+0x159/0x2f0\n  handle_softirqs+0xd3/0x2b0\n  ? __pfx_smpboot_thread_fn+0x10/0x10\n  run_ksoftirqd+0x25/0x30\n  smpboot_thread_fn+0xdd/0x1d0\n  kthread+0xd3/0x100\n  ? __pfx_kthread+0x10/0x10\n  ret_from_fork+0x34/0x50\n  ? __pfx_kthread+0x10/0x10\n  ret_from_fork_asm+0x1a/0x30\n  \u003c/TASK\u003e\n ---[ end trace 0000000000000000 ]---\n\nIts possible that two threads call tcp_v6_do_rcv()/sk_forward_alloc_add()\nconcurrently when sk-\u003esk_state == TCP_LISTEN with sk-\u003esk_lock unlocked,\nwhich triggers a data-race around sk-\u003esk_forward_alloc:\ntcp_v6_rcv\n    tcp_v6_do_rcv\n        skb_clone_and_charge_r\n            sk_rmem_schedule\n                __sk_mem_schedule\n                    sk_forward_alloc_add()\n            skb_set_owner_r\n                sk_mem_charge\n                    sk_forward_alloc_add()\n        __kfree_skb\n            skb_release_all\n                skb_release_head_state\n                    sock_rfree\n                        sk_mem_uncharge\n                            sk_forward_alloc_add()\n                            sk_mem_reclaim\n                                // set local var reclaimable\n                                __sk_mem_reclaim\n                                    sk_forward_alloc_add()\n\nIn this syzkaller testcase, two threads call\ntcp_v6_do_rcv() with skb-\u003etruesize=768, the sk_forward_alloc changes like\nthis:\n (cpu 1)             | (cpu 2)             | sk_forward_alloc\n ...                 | ...                 | 0\n __sk_mem_schedule() |                     | +4096 = 4096\n                     | __sk_mem_schedule() | +4096 = 8192\n sk_mem_charge()     |                     | -768  = 7424\n                     | sk_mem_charge()     | -768  = 6656\n ...                 |    ...              |\n sk_mem_uncharge()   |                     | +768  = 7424\n reclaimable=7424    |                     |\n                     | sk_mem_uncharge()   | +768  = 8192\n                     | reclaimable=8192    |\n __sk_mem_reclaim()  |                     | -4096 = 4096\n                     | __sk_mem_reclaim()  | -8192 = -4096 != 0\n\nThe skb_clone_and_charge_r() should not be called in tcp_v6_do_rcv() when\nsk-\u003esk_state is TCP_LISTEN, it happens later in tcp_v6_syn_recv_sock().\nFix the same issue in dccp_v6_do_rcv().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
          "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-53124",
          "url": "https://www.suse.com/security/cve/CVE-2024-53124"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1234074 for CVE-2024-53124",
          "url": "https://bugzilla.suse.com/1234074"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-25T09:37:28Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-53124"
    },
    {
      "cve": "CVE-2024-53139",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-53139"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsctp: fix possible UAF in sctp_v6_available()\n\nA lockdep report [1] with CONFIG_PROVE_RCU_LIST=y hints\nthat sctp_v6_available() is calling dev_get_by_index_rcu()\nand ipv6_chk_addr() without holding rcu.\n\n[1]\n =============================\n WARNING: suspicious RCU usage\n 6.12.0-rc5-virtme #1216 Tainted: G        W\n -----------------------------\n net/core/dev.c:876 RCU-list traversed in non-reader section!!\n\nother info that might help us debug this:\n\nrcu_scheduler_active = 2, debug_locks = 1\n 1 lock held by sctp_hello/31495:\n #0: ffff9f1ebbdb7418 (sk_lock-AF_INET6){+.+.}-{0:0}, at: sctp_bind (./arch/x86/include/asm/jump_label.h:27 net/sctp/socket.c:315) sctp\n\nstack backtrace:\n CPU: 7 UID: 0 PID: 31495 Comm: sctp_hello Tainted: G        W          6.12.0-rc5-virtme #1216\n Tainted: [W]=WARN\n Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014\n Call Trace:\n  \u003cTASK\u003e\n dump_stack_lvl (lib/dump_stack.c:123)\n lockdep_rcu_suspicious (kernel/locking/lockdep.c:6822)\n dev_get_by_index_rcu (net/core/dev.c:876 (discriminator 7))\n sctp_v6_available (net/sctp/ipv6.c:701) sctp\n sctp_do_bind (net/sctp/socket.c:400 (discriminator 1)) sctp\n sctp_bind (net/sctp/socket.c:320) sctp\n inet6_bind_sk (net/ipv6/af_inet6.c:465)\n ? security_socket_bind (security/security.c:4581 (discriminator 1))\n __sys_bind (net/socket.c:1848 net/socket.c:1869)\n ? do_user_addr_fault (./include/linux/rcupdate.h:347 ./include/linux/rcupdate.h:880 ./include/linux/mm.h:729 arch/x86/mm/fault.c:1340)\n ? do_user_addr_fault (./arch/x86/include/asm/preempt.h:84 (discriminator 13) ./include/linux/rcupdate.h:98 (discriminator 13) ./include/linux/rcupdate.h:882 (discriminator 13) ./include/linux/mm.h:729 (discriminator 13) arch/x86/mm/fault.c:1340 (discriminator 13))\n __x64_sys_bind (net/socket.c:1877 (discriminator 1) net/socket.c:1875 (discriminator 1) net/socket.c:1875 (discriminator 1))\n do_syscall_64 (arch/x86/entry/common.c:52 (discriminator 1) arch/x86/entry/common.c:83 (discriminator 1))\n entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130)\n RIP: 0033:0x7f59b934a1e7\n Code: 44 00 00 48 8b 15 39 8c 0c 00 f7 d8 64 89 02 b8 ff ff ff ff eb bd 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 b8 31 00 00 00 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 8b 0d 09 8c 0c 00 f7 d8 64 89 01 48\nAll code\n========\n   0:\t44 00 00             \tadd    %r8b,(%rax)\n   3:\t48 8b 15 39 8c 0c 00 \tmov    0xc8c39(%rip),%rdx        # 0xc8c43\n   a:\tf7 d8                \tneg    %eax\n   c:\t64 89 02             \tmov    %eax,%fs:(%rdx)\n   f:\tb8 ff ff ff ff       \tmov    $0xffffffff,%eax\n  14:\teb bd                \tjmp    0xffffffffffffffd3\n  16:\t66 2e 0f 1f 84 00 00 \tcs nopw 0x0(%rax,%rax,1)\n  1d:\t00 00 00\n  20:\t0f 1f 00             \tnopl   (%rax)\n  23:\tb8 31 00 00 00       \tmov    $0x31,%eax\n  28:\t0f 05                \tsyscall\n  2a:*\t48 3d 01 f0 ff ff    \tcmp    $0xfffffffffffff001,%rax\t\t\u003c-- trapping instruction\n  30:\t73 01                \tjae    0x33\n  32:\tc3                   \tret\n  33:\t48 8b 0d 09 8c 0c 00 \tmov    0xc8c09(%rip),%rcx        # 0xc8c43\n  3a:\tf7 d8                \tneg    %eax\n  3c:\t64 89 01             \tmov    %eax,%fs:(%rcx)\n  3f:\t48                   \trex.W\n\nCode starting with the faulting instruction\n===========================================\n   0:\t48 3d 01 f0 ff ff    \tcmp    $0xfffffffffffff001,%rax\n   6:\t73 01                \tjae    0x9\n   8:\tc3                   \tret\n   9:\t48 8b 0d 09 8c 0c 00 \tmov    0xc8c09(%rip),%rcx        # 0xc8c19\n  10:\tf7 d8                \tneg    %eax\n  12:\t64 89 01             \tmov    %eax,%fs:(%rcx)\n  15:\t48                   \trex.W\n RSP: 002b:00007ffe2d0ad398 EFLAGS: 00000202 ORIG_RAX: 0000000000000031\n RAX: ffffffffffffffda RBX: 00007ffe2d0ad3d0 RCX: 00007f59b934a1e7\n RDX: 000000000000001c RSI: 00007ffe2d0ad3d0 RDI: 0000000000000005\n RBP: 0000000000000005 R08: 1999999999999999 R09: 0000000000000000\n R10: 00007f59b9253298 R11: 000000000000\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
          "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-53139",
          "url": "https://www.suse.com/security/cve/CVE-2024-53139"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1234157 for CVE-2024-53139",
          "url": "https://bugzilla.suse.com/1234157"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-25T09:37:28Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-53139"
    },
    {
      "cve": "CVE-2024-58018",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-58018"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvkm: correctly calculate the available space of the GSP cmdq buffer\n\nr535_gsp_cmdq_push() waits for the available page in the GSP cmdq\nbuffer when handling a large RPC request. When it sees at least one\navailable page in the cmdq, it quits the waiting with the amount of\nfree buffer pages in the queue.\n\nUnfortunately, it always takes the [write pointer, buf_size) as\navailable buffer pages before rolling back and wrongly calculates the\nsize of the data should be copied. Thus, it can overwrite the RPC\nrequest that GSP is currently reading, which causes GSP hang due\nto corrupted RPC request:\n\n[  549.209389] ------------[ cut here ]------------\n[  549.214010] WARNING: CPU: 8 PID: 6314 at drivers/gpu/drm/nouveau/nvkm/subdev/gsp/r535.c:116 r535_gsp_msgq_wait+0xd0/0x190 [nvkm]\n[  549.225678] Modules linked in: nvkm(E+) gsp_log(E) snd_seq_dummy(E) snd_hrtimer(E) snd_seq(E) snd_timer(E) snd_seq_device(E) snd(E) soundcore(E) rfkill(E) qrtr(E) vfat(E) fat(E) ipmi_ssif(E) amd_atl(E) intel_rapl_msr(E) intel_rapl_common(E) mlx5_ib(E) amd64_edac(E) edac_mce_amd(E) kvm_amd(E) ib_uverbs(E) kvm(E) ib_core(E) acpi_ipmi(E) ipmi_si(E) mxm_wmi(E) ipmi_devintf(E) rapl(E) i2c_piix4(E) wmi_bmof(E) joydev(E) ptdma(E) acpi_cpufreq(E) k10temp(E) pcspkr(E) ipmi_msghandler(E) xfs(E) libcrc32c(E) ast(E) i2c_algo_bit(E) crct10dif_pclmul(E) drm_shmem_helper(E) nvme_tcp(E) crc32_pclmul(E) ahci(E) drm_kms_helper(E) libahci(E) nvme_fabrics(E) crc32c_intel(E) nvme(E) cdc_ether(E) mlx5_core(E) nvme_core(E) usbnet(E) drm(E) libata(E) ccp(E) ghash_clmulni_intel(E) mii(E) t10_pi(E) mlxfw(E) sp5100_tco(E) psample(E) pci_hyperv_intf(E) wmi(E) dm_multipath(E) sunrpc(E) dm_mirror(E) dm_region_hash(E) dm_log(E) dm_mod(E) be2iscsi(E) bnx2i(E) cnic(E) uio(E) cxgb4i(E) cxgb4(E) tls(E) libcxgbi(E) libcxgb(E) qla4xxx(E)\n[  549.225752]  iscsi_boot_sysfs(E) iscsi_tcp(E) libiscsi_tcp(E) libiscsi(E) scsi_transport_iscsi(E) fuse(E) [last unloaded: gsp_log(E)]\n[  549.326293] CPU: 8 PID: 6314 Comm: insmod Tainted: G            E      6.9.0-rc6+ #1\n[  549.334039] Hardware name: ASRockRack 1U1G-MILAN/N/ROMED8-NL, BIOS L3.12E 09/06/2022\n[  549.341781] RIP: 0010:r535_gsp_msgq_wait+0xd0/0x190 [nvkm]\n[  549.347343] Code: 08 00 00 89 da c1 e2 0c 48 8d ac 11 00 10 00 00 48 8b 0c 24 48 85 c9 74 1f c1 e0 0c 4c 8d 6d 30 83 e8 30 89 01 e9 68 ff ff ff \u003c0f\u003e 0b 49 c7 c5 92 ff ff ff e9 5a ff ff ff ba ff ff ff ff be c0 0c\n[  549.366090] RSP: 0018:ffffacbccaaeb7d0 EFLAGS: 00010246\n[  549.371315] RAX: 0000000000000000 RBX: 0000000000000012 RCX: 0000000000923e28\n[  549.378451] RDX: 0000000000000000 RSI: 0000000055555554 RDI: ffffacbccaaeb730\n[  549.385590] RBP: 0000000000000001 R08: ffff8bd14d235f70 R09: ffff8bd14d235f70\n[  549.392721] R10: 0000000000000002 R11: ffff8bd14d233864 R12: 0000000000000020\n[  549.399854] R13: ffffacbccaaeb818 R14: 0000000000000020 R15: ffff8bb298c67000\n[  549.406988] FS:  00007f5179244740(0000) GS:ffff8bd14d200000(0000) knlGS:0000000000000000\n[  549.415076] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[  549.420829] CR2: 00007fa844000010 CR3: 00000001567dc005 CR4: 0000000000770ef0\n[  549.427963] PKRU: 55555554\n[  549.430672] Call Trace:\n[  549.433126]  \u003cTASK\u003e\n[  549.435233]  ? __warn+0x7f/0x130\n[  549.438473]  ? r535_gsp_msgq_wait+0xd0/0x190 [nvkm]\n[  549.443426]  ? report_bug+0x18a/0x1a0\n[  549.447098]  ? handle_bug+0x3c/0x70\n[  549.450589]  ? exc_invalid_op+0x14/0x70\n[  549.454430]  ? asm_exc_invalid_op+0x16/0x20\n[  549.458619]  ? r535_gsp_msgq_wait+0xd0/0x190 [nvkm]\n[  549.463565]  r535_gsp_msg_recv+0x46/0x230 [nvkm]\n[  549.468257]  r535_gsp_rpc_push+0x106/0x160 [nvkm]\n[  549.473033]  r535_gsp_rpc_rm_ctrl_push+0x40/0x130 [nvkm]\n[  549.478422]  nvidia_grid_init_vgpu_types+0xbc/0xe0 [nvkm]\n[  549.483899]  nvidia_grid_init+0xb1/0xd0 [nvkm]\n[  549.488420]  ? srso_alias_return_thunk+0x5/0xfbef5\n[  549.493213]  nvkm_device_pci_probe+0x305/0x420 [nvkm]\n[  549.498338]  local_pci_probe+0x46/\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
          "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-58018",
          "url": "https://www.suse.com/security/cve/CVE-2024-58018"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238990 for CVE-2024-58018",
          "url": "https://bugzilla.suse.com/1238990"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-25T09:37:28Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-58018"
    },
    {
      "cve": "CVE-2024-58071",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-58071"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nteam: prevent adding a device which is already a team device lower\n\nPrevent adding a device which is already a team device lower,\ne.g. adding veth0 if vlan1 was already added and veth0 is a lower of\nvlan1.\n\nThis is not useful in practice and can lead to recursive locking:\n\n$ ip link add veth0 type veth peer name veth1\n$ ip link set veth0 up\n$ ip link set veth1 up\n$ ip link add link veth0 name veth0.1 type vlan protocol 802.1Q id 1\n$ ip link add team0 type team\n$ ip link set veth0.1 down\n$ ip link set veth0.1 master team0\nteam0: Port device veth0.1 added\n$ ip link set veth0 down\n$ ip link set veth0 master team0\n\n============================================\nWARNING: possible recursive locking detected\n6.13.0-rc2-virtme-00441-ga14a429069bb #46 Not tainted\n--------------------------------------------\nip/7684 is trying to acquire lock:\nffff888016848e00 (team-\u003eteam_lock_key){+.+.}-{4:4}, at: team_device_event (drivers/net/team/team_core.c:2928 drivers/net/team/team_core.c:2951 drivers/net/team/team_core.c:2973)\n\nbut task is already holding lock:\nffff888016848e00 (team-\u003eteam_lock_key){+.+.}-{4:4}, at: team_add_slave (drivers/net/team/team_core.c:1147 drivers/net/team/team_core.c:1977)\n\nother info that might help us debug this:\nPossible unsafe locking scenario:\n\nCPU0\n----\nlock(team-\u003eteam_lock_key);\nlock(team-\u003eteam_lock_key);\n\n*** DEADLOCK ***\n\nMay be due to missing lock nesting notation\n\n2 locks held by ip/7684:\n\nstack backtrace:\nCPU: 3 UID: 0 PID: 7684 Comm: ip Not tainted 6.13.0-rc2-virtme-00441-ga14a429069bb #46\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014\nCall Trace:\n\u003cTASK\u003e\ndump_stack_lvl (lib/dump_stack.c:122)\nprint_deadlock_bug.cold (kernel/locking/lockdep.c:3040)\n__lock_acquire (kernel/locking/lockdep.c:3893 kernel/locking/lockdep.c:5226)\n? netlink_broadcast_filtered (net/netlink/af_netlink.c:1548)\nlock_acquire.part.0 (kernel/locking/lockdep.c:467 kernel/locking/lockdep.c:5851)\n? team_device_event (drivers/net/team/team_core.c:2928 drivers/net/team/team_core.c:2951 drivers/net/team/team_core.c:2973)\n? trace_lock_acquire (./include/trace/events/lock.h:24 (discriminator 2))\n? team_device_event (drivers/net/team/team_core.c:2928 drivers/net/team/team_core.c:2951 drivers/net/team/team_core.c:2973)\n? lock_acquire (kernel/locking/lockdep.c:5822)\n? team_device_event (drivers/net/team/team_core.c:2928 drivers/net/team/team_core.c:2951 drivers/net/team/team_core.c:2973)\n__mutex_lock (kernel/locking/mutex.c:587 kernel/locking/mutex.c:735)\n? team_device_event (drivers/net/team/team_core.c:2928 drivers/net/team/team_core.c:2951 drivers/net/team/team_core.c:2973)\n? team_device_event (drivers/net/team/team_core.c:2928 drivers/net/team/team_core.c:2951 drivers/net/team/team_core.c:2973)\n? fib_sync_up (net/ipv4/fib_semantics.c:2167)\n? team_device_event (drivers/net/team/team_core.c:2928 drivers/net/team/team_core.c:2951 drivers/net/team/team_core.c:2973)\nteam_device_event (drivers/net/team/team_core.c:2928 drivers/net/team/team_core.c:2951 drivers/net/team/team_core.c:2973)\nnotifier_call_chain (kernel/notifier.c:85)\ncall_netdevice_notifiers_info (net/core/dev.c:1996)\n__dev_notify_flags (net/core/dev.c:8993)\n? __dev_change_flags (net/core/dev.c:8975)\ndev_change_flags (net/core/dev.c:9027)\nvlan_device_event (net/8021q/vlan.c:85 net/8021q/vlan.c:470)\n? br_device_event (net/bridge/br.c:143)\nnotifier_call_chain (kernel/notifier.c:85)\ncall_netdevice_notifiers_info (net/core/dev.c:1996)\ndev_open (net/core/dev.c:1519 net/core/dev.c:1505)\nteam_add_slave (drivers/net/team/team_core.c:1219 drivers/net/team/team_core.c:1977)\n? __pfx_team_add_slave (drivers/net/team/team_core.c:1972)\ndo_set_master (net/core/rtnetlink.c:2917)\ndo_setlink.isra.0 (net/core/rtnetlink.c:3117)",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
          "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-58071",
          "url": "https://www.suse.com/security/cve/CVE-2024-58071"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238970 for CVE-2024-58071",
          "url": "https://bugzilla.suse.com/1238970"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-25T09:37:28Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-58071"
    },
    {
      "cve": "CVE-2025-21729",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21729"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: rtw89: fix race between cancel_hw_scan and hw_scan completion\n\nThe rtwdev-\u003escanning flag isn\u0027t protected by mutex originally, so\ncancel_hw_scan can pass the condition, but suddenly hw_scan completion\nunset the flag and calls ieee80211_scan_completed() that will free\nlocal-\u003ehw_scan_req. Then, cancel_hw_scan raises null-ptr-deref and\nuse-after-free. Fix it by moving the check condition to where\nprotected by mutex.\n\n KASAN: null-ptr-deref in range [0x0000000000000088-0x000000000000008f]\n CPU: 2 PID: 6922 Comm: kworker/2:2 Tainted: G           OE\n Hardware name: LENOVO 2356AD1/2356AD1, BIOS G7ETB6WW (2.76 ) 09/10/2019\n Workqueue: events cfg80211_conn_work [cfg80211]\n RIP: 0010:rtw89_fw_h2c_scan_offload_be+0xc33/0x13c3 [rtw89_core]\n Code: 00 45 89 6c 24 1c 0f 85 23 01 00 00 48 8b 85 20 ff ff ff 48 8d\n RSP: 0018:ffff88811fd9f068 EFLAGS: 00010206\n RAX: dffffc0000000000 RBX: ffff88811fd9f258 RCX: 0000000000000001\n RDX: 0000000000000011 RSI: 0000000000000001 RDI: 0000000000000089\n RBP: ffff88811fd9f170 R08: 0000000000000000 R09: 0000000000000000\n R10: ffff88811fd9f108 R11: 0000000000000000 R12: ffff88810e47f960\n R13: 0000000000000000 R14: 000000000000ffff R15: 0000000000000000\n FS:  0000000000000000(0000) GS:ffff8881d6f00000(0000) knlGS:0000000000000000\n CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 00007531dfca55b0 CR3: 00000001be296004 CR4: 00000000001706e0\n Call Trace:\n  \u003cTASK\u003e\n  ? show_regs+0x61/0x73\n  ? __die_body+0x20/0x73\n  ? die_addr+0x4f/0x7b\n  ? exc_general_protection+0x191/0x1db\n  ? asm_exc_general_protection+0x27/0x30\n  ? rtw89_fw_h2c_scan_offload_be+0xc33/0x13c3 [rtw89_core]\n  ? rtw89_fw_h2c_scan_offload_be+0x458/0x13c3 [rtw89_core]\n  ? __pfx_rtw89_fw_h2c_scan_offload_be+0x10/0x10 [rtw89_core]\n  ? do_raw_spin_lock+0x75/0xdb\n  ? __pfx_do_raw_spin_lock+0x10/0x10\n  rtw89_hw_scan_offload+0xb5e/0xbf7 [rtw89_core]\n  ? _raw_spin_unlock+0xe/0x24\n  ? __mutex_lock.constprop.0+0x40c/0x471\n  ? __pfx_rtw89_hw_scan_offload+0x10/0x10 [rtw89_core]\n  ? __mutex_lock_slowpath+0x13/0x1f\n  ? mutex_lock+0xa2/0xdc\n  ? __pfx_mutex_lock+0x10/0x10\n  rtw89_hw_scan_abort+0x58/0xb7 [rtw89_core]\n  rtw89_ops_cancel_hw_scan+0x120/0x13b [rtw89_core]\n  ieee80211_scan_cancel+0x468/0x4d0 [mac80211]\n  ieee80211_prep_connection+0x858/0x899 [mac80211]\n  ieee80211_mgd_auth+0xbea/0xdde [mac80211]\n  ? __pfx_ieee80211_mgd_auth+0x10/0x10 [mac80211]\n  ? cfg80211_find_elem+0x15/0x29 [cfg80211]\n  ? is_bss+0x1b7/0x1d7 [cfg80211]\n  ieee80211_auth+0x18/0x27 [mac80211]\n  cfg80211_mlme_auth+0x3bb/0x3e7 [cfg80211]\n  cfg80211_conn_do_work+0x410/0xb81 [cfg80211]\n  ? __pfx_cfg80211_conn_do_work+0x10/0x10 [cfg80211]\n  ? __kasan_check_read+0x11/0x1f\n  ? psi_group_change+0x8bc/0x944\n  ? __kasan_check_write+0x14/0x22\n  ? mutex_lock+0x8e/0xdc\n  ? __pfx_mutex_lock+0x10/0x10\n  ? __pfx___radix_tree_lookup+0x10/0x10\n  cfg80211_conn_work+0x245/0x34d [cfg80211]\n  ? __pfx_cfg80211_conn_work+0x10/0x10 [cfg80211]\n  ? update_cfs_rq_load_avg+0x3bc/0x3d7\n  ? sched_clock_noinstr+0x9/0x1a\n  ? sched_clock+0x10/0x24\n  ? sched_clock_cpu+0x7e/0x42e\n  ? newidle_balance+0x796/0x937\n  ? __pfx_sched_clock_cpu+0x10/0x10\n  ? __pfx_newidle_balance+0x10/0x10\n  ? __kasan_check_read+0x11/0x1f\n  ? psi_group_change+0x8bc/0x944\n  ? _raw_spin_unlock+0xe/0x24\n  ? raw_spin_rq_unlock+0x47/0x54\n  ? raw_spin_rq_unlock_irq+0x9/0x1f\n  ? finish_task_switch.isra.0+0x347/0x586\n  ? __schedule+0x27bf/0x2892\n  ? mutex_unlock+0x80/0xd0\n  ? do_raw_spin_lock+0x75/0xdb\n  ? __pfx___schedule+0x10/0x10\n  process_scheduled_works+0x58c/0x821\n  worker_thread+0x4c7/0x586\n  ? __kasan_check_read+0x11/0x1f\n  kthread+0x285/0x294\n  ? __pfx_worker_thread+0x10/0x10\n  ? __pfx_kthread+0x10/0x10\n  ret_from_fork+0x29/0x6f\n  ? __pfx_kthread+0x10/0x10\n  ret_from_fork_asm+0x1b/0x30\n  \u003c/TASK\u003e",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
          "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21729",
          "url": "https://www.suse.com/security/cve/CVE-2025-21729"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1237874 for CVE-2025-21729",
          "url": "https://bugzilla.suse.com/1237874"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-25T09:37:28Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-21729"
    },
    {
      "cve": "CVE-2025-21755",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21755"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
          "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21755",
          "url": "https://www.suse.com/security/cve/CVE-2025-21755"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1237882 for CVE-2025-21755",
          "url": "https://bugzilla.suse.com/1237882"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-25T09:37:28Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-21755"
    },
    {
      "cve": "CVE-2025-21806",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21806"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: let net.core.dev_weight always be non-zero\n\nThe following problem was encountered during stability test:\n\n(NULL net_device): NAPI poll function process_backlog+0x0/0x530 \\\n\treturned 1, exceeding its budget of 0.\n------------[ cut here ]------------\nlist_add double add: new=ffff88905f746f48, prev=ffff88905f746f48, \\\n\tnext=ffff88905f746e40.\nWARNING: CPU: 18 PID: 5462 at lib/list_debug.c:35 \\\n\t__list_add_valid_or_report+0xf3/0x130\nCPU: 18 UID: 0 PID: 5462 Comm: ping Kdump: loaded Not tainted 6.13.0-rc7+\nRIP: 0010:__list_add_valid_or_report+0xf3/0x130\nCall Trace:\n? __warn+0xcd/0x250\n? __list_add_valid_or_report+0xf3/0x130\nenqueue_to_backlog+0x923/0x1070\nnetif_rx_internal+0x92/0x2b0\n__netif_rx+0x15/0x170\nloopback_xmit+0x2ef/0x450\ndev_hard_start_xmit+0x103/0x490\n__dev_queue_xmit+0xeac/0x1950\nip_finish_output2+0x6cc/0x1620\nip_output+0x161/0x270\nip_push_pending_frames+0x155/0x1a0\nraw_sendmsg+0xe13/0x1550\n__sys_sendto+0x3bf/0x4e0\n__x64_sys_sendto+0xdc/0x1b0\ndo_syscall_64+0x5b/0x170\nentry_SYSCALL_64_after_hwframe+0x76/0x7e\n\nThe reproduction command is as follows:\n  sysctl -w net.core.dev_weight=0\n  ping 127.0.0.1\n\nThis is because when the napi\u0027s weight is set to 0, process_backlog() may\nreturn 0 and clear the NAPI_STATE_SCHED bit of napi-\u003estate, causing this\nnapi to be re-polled in net_rx_action() until __do_softirq() times out.\nSince the NAPI_STATE_SCHED bit has been cleared, napi_schedule_rps() can\nbe retriggered in enqueue_to_backlog(), causing this issue.\n\nMaking the napi\u0027s weight always non-zero solves this problem.\n\nTriggering this issue requires system-wide admin (setting is\nnot namespaced).",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
          "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21806",
          "url": "https://www.suse.com/security/cve/CVE-2025-21806"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238746 for CVE-2025-21806",
          "url": "https://bugzilla.suse.com/1238746"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-25T09:37:28Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-21806"
    },
    {
      "cve": "CVE-2025-21836",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21836"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring/kbuf: reallocate buf lists on upgrade\n\nIORING_REGISTER_PBUF_RING can reuse an old struct io_buffer_list if it\nwas created for legacy selected buffer and has been emptied. It violates\nthe requirement that most of the field should stay stable after publish.\nAlways reallocate it instead.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
          "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21836",
          "url": "https://www.suse.com/security/cve/CVE-2025-21836"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1239066 for CVE-2025-21836",
          "url": "https://bugzilla.suse.com/1239066"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-25T09:37:28Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-21836"
    },
    {
      "cve": "CVE-2025-21863",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21863"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring: prevent opcode speculation\n\nsqe-\u003eopcode is used for different tables, make sure we santitise it\nagainst speculations.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
          "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21863",
          "url": "https://www.suse.com/security/cve/CVE-2025-21863"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1239475 for CVE-2025-21863",
          "url": "https://bugzilla.suse.com/1239475"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-25T09:37:28Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-21863"
    },
    {
      "cve": "CVE-2025-21873",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21873"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: ufs: core: bsg: Fix crash when arpmb command fails\n\nIf the device doesn\u0027t support arpmb we\u0027ll crash due to copying user data in\nbsg_transport_sg_io_fn().\n\nIn the case where ufs_bsg_exec_advanced_rpmb_req() returns an error, do not\nset the job\u0027s reply_len.\n\nMemory crash backtrace:\n3,1290,531166405,-;ufshcd 0000:00:12.5: ARPMB OP failed: error code -22\n\n4,1308,531166555,-;Call Trace:\n\n4,1309,531166559,-; \u003cTASK\u003e\n\n4,1310,531166565,-; ? show_regs+0x6d/0x80\n\n4,1311,531166575,-; ? die+0x37/0xa0\n\n4,1312,531166583,-; ? do_trap+0xd4/0xf0\n\n4,1313,531166593,-; ? do_error_trap+0x71/0xb0\n\n4,1314,531166601,-; ? usercopy_abort+0x6c/0x80\n\n4,1315,531166610,-; ? exc_invalid_op+0x52/0x80\n\n4,1316,531166622,-; ? usercopy_abort+0x6c/0x80\n\n4,1317,531166630,-; ? asm_exc_invalid_op+0x1b/0x20\n\n4,1318,531166643,-; ? usercopy_abort+0x6c/0x80\n\n4,1319,531166652,-; __check_heap_object+0xe3/0x120\n\n4,1320,531166661,-; check_heap_object+0x185/0x1d0\n\n4,1321,531166670,-; __check_object_size.part.0+0x72/0x150\n\n4,1322,531166679,-; __check_object_size+0x23/0x30\n\n4,1323,531166688,-; bsg_transport_sg_io_fn+0x314/0x3b0",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
          "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21873",
          "url": "https://www.suse.com/security/cve/CVE-2025-21873"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1240184 for CVE-2025-21873",
          "url": "https://bugzilla.suse.com/1240184"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-25T09:37:28Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-21873"
    },
    {
      "cve": "CVE-2025-21875",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21875"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmptcp: always handle address removal under msk socket lock\n\nSyzkaller reported a lockdep splat in the PM control path:\n\n  WARNING: CPU: 0 PID: 6693 at ./include/net/sock.h:1711 sock_owned_by_me include/net/sock.h:1711 [inline]\n  WARNING: CPU: 0 PID: 6693 at ./include/net/sock.h:1711 msk_owned_by_me net/mptcp/protocol.h:363 [inline]\n  WARNING: CPU: 0 PID: 6693 at ./include/net/sock.h:1711 mptcp_pm_nl_addr_send_ack+0x57c/0x610 net/mptcp/pm_netlink.c:788\n  Modules linked in:\n  CPU: 0 UID: 0 PID: 6693 Comm: syz.0.205 Not tainted 6.14.0-rc2-syzkaller-00303-gad1b832bf1cf #0\n  Hardware name: Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024\n  RIP: 0010:sock_owned_by_me include/net/sock.h:1711 [inline]\n  RIP: 0010:msk_owned_by_me net/mptcp/protocol.h:363 [inline]\n  RIP: 0010:mptcp_pm_nl_addr_send_ack+0x57c/0x610 net/mptcp/pm_netlink.c:788\n  Code: 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc e8 ca 7b d3 f5 eb b9 e8 c3 7b d3 f5 90 0f 0b 90 e9 dd fb ff ff e8 b5 7b d3 f5 90 \u003c0f\u003e 0b 90 e9 3e fb ff ff 44 89 f1 80 e1 07 38 c1 0f 8c eb fb ff ff\n  RSP: 0000:ffffc900034f6f60 EFLAGS: 00010283\n  RAX: ffffffff8bee3c2b RBX: 0000000000000001 RCX: 0000000000080000\n  RDX: ffffc90004d42000 RSI: 000000000000a407 RDI: 000000000000a408\n  RBP: ffffc900034f7030 R08: ffffffff8bee37f6 R09: 0100000000000000\n  R10: dffffc0000000000 R11: ffffed100bcc62e4 R12: ffff88805e6316e0\n  R13: ffff88805e630c00 R14: dffffc0000000000 R15: ffff88805e630c00\n  FS:  00007f7e9a7e96c0(0000) GS:ffff8880b8600000(0000) knlGS:0000000000000000\n  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n  CR2: 0000001b2fd18ff8 CR3: 0000000032c24000 CR4: 00000000003526f0\n  DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n  DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n  Call Trace:\n   \u003cTASK\u003e\n   mptcp_pm_remove_addr+0x103/0x1d0 net/mptcp/pm.c:59\n   mptcp_pm_remove_anno_addr+0x1f4/0x2f0 net/mptcp/pm_netlink.c:1486\n   mptcp_nl_remove_subflow_and_signal_addr net/mptcp/pm_netlink.c:1518 [inline]\n   mptcp_pm_nl_del_addr_doit+0x118d/0x1af0 net/mptcp/pm_netlink.c:1629\n   genl_family_rcv_msg_doit net/netlink/genetlink.c:1115 [inline]\n   genl_family_rcv_msg net/netlink/genetlink.c:1195 [inline]\n   genl_rcv_msg+0xb1f/0xec0 net/netlink/genetlink.c:1210\n   netlink_rcv_skb+0x206/0x480 net/netlink/af_netlink.c:2543\n   genl_rcv+0x28/0x40 net/netlink/genetlink.c:1219\n   netlink_unicast_kernel net/netlink/af_netlink.c:1322 [inline]\n   netlink_unicast+0x7f6/0x990 net/netlink/af_netlink.c:1348\n   netlink_sendmsg+0x8de/0xcb0 net/netlink/af_netlink.c:1892\n   sock_sendmsg_nosec net/socket.c:718 [inline]\n   __sock_sendmsg+0x221/0x270 net/socket.c:733\n   ____sys_sendmsg+0x53a/0x860 net/socket.c:2573\n   ___sys_sendmsg net/socket.c:2627 [inline]\n   __sys_sendmsg+0x269/0x350 net/socket.c:2659\n   do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n   do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83\n   entry_SYSCALL_64_after_hwframe+0x77/0x7f\n  RIP: 0033:0x7f7e9998cde9\n  Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48\n  RSP: 002b:00007f7e9a7e9038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e\n  RAX: ffffffffffffffda RBX: 00007f7e99ba5fa0 RCX: 00007f7e9998cde9\n  RDX: 000000002000c094 RSI: 0000400000000000 RDI: 0000000000000007\n  RBP: 00007f7e99a0e2a0 R08: 0000000000000000 R09: 0000000000000000\n  R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000\n  R13: 0000000000000000 R14: 00007f7e99ba5fa0 R15: 00007fff49231088\n\nIndeed the PM can try to send a RM_ADDR over a msk without acquiring\nfirst the msk socket lock.\n\nThe bugged code-path comes from an early optimization: when there\nare no subflows, the PM should (usually) not send RM_ADDR\nnotifications.\n\nThe above statement is incorrect, as without locks another process\ncould concur\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
          "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21875",
          "url": "https://www.suse.com/security/cve/CVE-2025-21875"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1240168 for CVE-2025-21875",
          "url": "https://bugzilla.suse.com/1240168"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-25T09:37:28Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-21875"
    },
    {
      "cve": "CVE-2025-21881",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21881"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nuprobes: Reject the shared zeropage in uprobe_write_opcode()\n\nWe triggered the following crash in syzkaller tests:\n\n  BUG: Bad page state in process syz.7.38  pfn:1eff3\n  page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1eff3\n  flags: 0x3fffff00004004(referenced|reserved|node=0|zone=1|lastcpupid=0x1fffff)\n  raw: 003fffff00004004 ffffe6c6c07bfcc8 ffffe6c6c07bfcc8 0000000000000000\n  raw: 0000000000000000 0000000000000000 00000000fffffffe 0000000000000000\n  page dumped because: PAGE_FLAGS_CHECK_AT_FREE flag(s) set\n  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.13.0-1ubuntu1.1 04/01/2014\n  Call Trace:\n   \u003cTASK\u003e\n   dump_stack_lvl+0x32/0x50\n   bad_page+0x69/0xf0\n   free_unref_page_prepare+0x401/0x500\n   free_unref_page+0x6d/0x1b0\n   uprobe_write_opcode+0x460/0x8e0\n   install_breakpoint.part.0+0x51/0x80\n   register_for_each_vma+0x1d9/0x2b0\n   __uprobe_register+0x245/0x300\n   bpf_uprobe_multi_link_attach+0x29b/0x4f0\n   link_create+0x1e2/0x280\n   __sys_bpf+0x75f/0xac0\n   __x64_sys_bpf+0x1a/0x30\n   do_syscall_64+0x56/0x100\n   entry_SYSCALL_64_after_hwframe+0x78/0xe2\n\n   BUG: Bad rss-counter state mm:00000000452453e0 type:MM_FILEPAGES val:-1\n\nThe following syzkaller test case can be used to reproduce:\n\n  r2 = creat(\u0026(0x7f0000000000)=\u0027./file0\\x00\u0027, 0x8)\n  write$nbd(r2, \u0026(0x7f0000000580)=ANY=[], 0x10)\n  r4 = openat(0xffffffffffffff9c, \u0026(0x7f0000000040)=\u0027./file0\\x00\u0027, 0x42, 0x0)\n  mmap$IORING_OFF_SQ_RING(\u0026(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x12, r4, 0x0)\n  r5 = userfaultfd(0x80801)\n  ioctl$UFFDIO_API(r5, 0xc018aa3f, \u0026(0x7f0000000040)={0xaa, 0x20})\n  r6 = userfaultfd(0x80801)\n  ioctl$UFFDIO_API(r6, 0xc018aa3f, \u0026(0x7f0000000140))\n  ioctl$UFFDIO_REGISTER(r6, 0xc020aa00, \u0026(0x7f0000000100)={{\u0026(0x7f0000ffc000/0x4000)=nil, 0x4000}, 0x2})\n  ioctl$UFFDIO_ZEROPAGE(r5, 0xc020aa04, \u0026(0x7f0000000000)={{\u0026(0x7f0000ffd000/0x1000)=nil, 0x1000}})\n  r7 = bpf$PROG_LOAD(0x5, \u0026(0x7f0000000140)={0x2, 0x3, \u0026(0x7f0000000200)=ANY=[@ANYBLOB=\"1800000000120000000000000000000095\"], \u0026(0x7f0000000000)=\u0027GPL\\x00\u0027, 0x7, 0x0, 0x0, 0x0, 0x0, \u0027\\x00\u0027, 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94)\n  bpf$BPF_LINK_CREATE_XDP(0x1c, \u0026(0x7f0000000040)={r7, 0x0, 0x30, 0x1e, @val=@uprobe_multi={\u0026(0x7f0000000080)=\u0027./file0\\x00\u0027, \u0026(0x7f0000000100)=[0x2], 0x0, 0x0, 0x1}}, 0x40)\n\nThe cause is that zero pfn is set to the PTE without increasing the RSS\ncount in mfill_atomic_pte_zeropage() and the refcount of zero folio does\nnot increase accordingly. Then, the operation on the same pfn is performed\nin uprobe_write_opcode()-\u003e__replace_page() to unconditional decrease the\nRSS count and old_folio\u0027s refcount.\n\nTherefore, two bugs are introduced:\n\n 1. The RSS count is incorrect, when process exit, the check_mm() report\n    error \"Bad rss-count\".\n\n 2. The reserved folio (zero folio) is freed when folio-\u003erefcount is zero,\n    then free_pages_prepare-\u003efree_page_is_bad() report error\n    \"Bad page state\".\n\nThere is more, the following warning could also theoretically be triggered:\n\n  __replace_page()\n    -\u003e ...\n      -\u003e folio_remove_rmap_pte()\n        -\u003e VM_WARN_ON_FOLIO(is_zero_folio(folio), folio)\n\nConsidering that uprobe hit on the zero folio is a very rare case, just\nreject zero old folio immediately after get_user_page_vma_remote().\n\n[ mingo: Cleaned up the changelog ]",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
          "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21881",
          "url": "https://www.suse.com/security/cve/CVE-2025-21881"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1240185 for CVE-2025-21881",
          "url": "https://bugzilla.suse.com/1240185"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-25T09:37:28Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-21881"
    },
    {
      "cve": "CVE-2025-21884",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21884"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: better track kernel sockets lifetime\n\nWhile kernel sockets are dismantled during pernet_operations-\u003eexit(),\ntheir freeing can be delayed by any tx packets still held in qdisc\nor device queues, due to skb_set_owner_w() prior calls.\n\nThis then trigger the following warning from ref_tracker_dir_exit() [1]\n\nTo fix this, make sure that kernel sockets own a reference on net-\u003epassive.\n\nAdd sk_net_refcnt_upgrade() helper, used whenever a kernel socket\nis converted to a refcounted one.\n\n[1]\n\n[  136.263918][   T35] ref_tracker: net notrefcnt@ffff8880638f01e0 has 1/2 users at\n[  136.263918][   T35]      sk_alloc+0x2b3/0x370\n[  136.263918][   T35]      inet6_create+0x6ce/0x10f0\n[  136.263918][   T35]      __sock_create+0x4c0/0xa30\n[  136.263918][   T35]      inet_ctl_sock_create+0xc2/0x250\n[  136.263918][   T35]      igmp6_net_init+0x39/0x390\n[  136.263918][   T35]      ops_init+0x31e/0x590\n[  136.263918][   T35]      setup_net+0x287/0x9e0\n[  136.263918][   T35]      copy_net_ns+0x33f/0x570\n[  136.263918][   T35]      create_new_namespaces+0x425/0x7b0\n[  136.263918][   T35]      unshare_nsproxy_namespaces+0x124/0x180\n[  136.263918][   T35]      ksys_unshare+0x57d/0xa70\n[  136.263918][   T35]      __x64_sys_unshare+0x38/0x40\n[  136.263918][   T35]      do_syscall_64+0xf3/0x230\n[  136.263918][   T35]      entry_SYSCALL_64_after_hwframe+0x77/0x7f\n[  136.263918][   T35]\n[  136.343488][   T35] ref_tracker: net notrefcnt@ffff8880638f01e0 has 1/2 users at\n[  136.343488][   T35]      sk_alloc+0x2b3/0x370\n[  136.343488][   T35]      inet6_create+0x6ce/0x10f0\n[  136.343488][   T35]      __sock_create+0x4c0/0xa30\n[  136.343488][   T35]      inet_ctl_sock_create+0xc2/0x250\n[  136.343488][   T35]      ndisc_net_init+0xa7/0x2b0\n[  136.343488][   T35]      ops_init+0x31e/0x590\n[  136.343488][   T35]      setup_net+0x287/0x9e0\n[  136.343488][   T35]      copy_net_ns+0x33f/0x570\n[  136.343488][   T35]      create_new_namespaces+0x425/0x7b0\n[  136.343488][   T35]      unshare_nsproxy_namespaces+0x124/0x180\n[  136.343488][   T35]      ksys_unshare+0x57d/0xa70\n[  136.343488][   T35]      __x64_sys_unshare+0x38/0x40\n[  136.343488][   T35]      do_syscall_64+0xf3/0x230\n[  136.343488][   T35]      entry_SYSCALL_64_after_hwframe+0x77/0x7f",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
          "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21884",
          "url": "https://www.suse.com/security/cve/CVE-2025-21884"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1240171 for CVE-2025-21884",
          "url": "https://bugzilla.suse.com/1240171"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-25T09:37:28Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-21884"
    },
    {
      "cve": "CVE-2025-21887",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21887"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\novl: fix UAF in ovl_dentry_update_reval by moving dput() in ovl_link_up\n\nThe issue was caused by dput(upper) being called before\novl_dentry_update_reval(), while upper-\u003ed_flags was still\naccessed in ovl_dentry_remote().\n\nMove dput(upper) after its last use to prevent use-after-free.\n\nBUG: KASAN: slab-use-after-free in ovl_dentry_remote fs/overlayfs/util.c:162 [inline]\nBUG: KASAN: slab-use-after-free in ovl_dentry_update_reval+0xd2/0xf0 fs/overlayfs/util.c:167\n\nCall Trace:\n \u003cTASK\u003e\n __dump_stack lib/dump_stack.c:88 [inline]\n dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:114\n print_address_description mm/kasan/report.c:377 [inline]\n print_report+0xc3/0x620 mm/kasan/report.c:488\n kasan_report+0xd9/0x110 mm/kasan/report.c:601\n ovl_dentry_remote fs/overlayfs/util.c:162 [inline]\n ovl_dentry_update_reval+0xd2/0xf0 fs/overlayfs/util.c:167\n ovl_link_up fs/overlayfs/copy_up.c:610 [inline]\n ovl_copy_up_one+0x2105/0x3490 fs/overlayfs/copy_up.c:1170\n ovl_copy_up_flags+0x18d/0x200 fs/overlayfs/copy_up.c:1223\n ovl_rename+0x39e/0x18c0 fs/overlayfs/dir.c:1136\n vfs_rename+0xf84/0x20a0 fs/namei.c:4893\n...\n \u003c/TASK\u003e",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
          "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21887",
          "url": "https://www.suse.com/security/cve/CVE-2025-21887"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1240176 for CVE-2025-21887",
          "url": "https://bugzilla.suse.com/1240176"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-25T09:37:28Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-21887"
    },
    {
      "cve": "CVE-2025-21889",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21889"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nperf/core: Add RCU read lock protection to perf_iterate_ctx()\n\nThe perf_iterate_ctx() function performs RCU list traversal but\ncurrently lacks RCU read lock protection. This causes lockdep warnings\nwhen running perf probe with unshare(1) under CONFIG_PROVE_RCU_LIST=y:\n\n\tWARNING: suspicious RCU usage\n\tkernel/events/core.c:8168 RCU-list traversed in non-reader section!!\n\n\t Call Trace:\n\t  lockdep_rcu_suspicious\n\t  ? perf_event_addr_filters_apply\n\t  perf_iterate_ctx\n\t  perf_event_exec\n\t  begin_new_exec\n\t  ? load_elf_phdrs\n\t  load_elf_binary\n\t  ? lock_acquire\n\t  ? find_held_lock\n\t  ? bprm_execve\n\t  bprm_execve\n\t  do_execveat_common.isra.0\n\t  __x64_sys_execve\n\t  do_syscall_64\n\t  entry_SYSCALL_64_after_hwframe\n\nThis protection was previously present but was removed in commit\nbd2756811766 (\"perf: Rewrite core context handling\"). Add back the\nnecessary rcu_read_lock()/rcu_read_unlock() pair around\nperf_iterate_ctx() call in perf_event_exec().\n\n[ mingo: Use scoped_guard() as suggested by Peter ]",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
          "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21889",
          "url": "https://www.suse.com/security/cve/CVE-2025-21889"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1240167 for CVE-2025-21889",
          "url": "https://bugzilla.suse.com/1240167"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-25T09:37:28Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-21889"
    },
    {
      "cve": "CVE-2025-21894",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21894"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: enetc: VFs do not support HWTSTAMP_TX_ONESTEP_SYNC\n\nActually ENETC VFs do not support HWTSTAMP_TX_ONESTEP_SYNC because only\nENETC PF can access PMa_SINGLE_STEP registers. And there will be a crash\nif VFs are used to test one-step timestamp, the crash log as follows.\n\n[  129.110909] Unable to handle kernel paging request at virtual address 00000000000080c0\n[  129.287769] Call trace:\n[  129.290219]  enetc_port_mac_wr+0x30/0xec (P)\n[  129.294504]  enetc_start_xmit+0xda4/0xe74\n[  129.298525]  enetc_xmit+0x70/0xec\n[  129.301848]  dev_hard_start_xmit+0x98/0x118",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
          "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21894",
          "url": "https://www.suse.com/security/cve/CVE-2025-21894"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1240581 for CVE-2025-21894",
          "url": "https://bugzilla.suse.com/1240581"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-25T09:37:28Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-21894"
    },
    {
      "cve": "CVE-2025-21895",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21895"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nperf/core: Order the PMU list to fix warning about unordered pmu_ctx_list\n\nSyskaller triggers a warning due to prev_epc-\u003epmu != next_epc-\u003epmu in\nperf_event_swap_task_ctx_data(). vmcore shows that two lists have the same\nperf_event_pmu_context, but not in the same order.\n\nThe problem is that the order of pmu_ctx_list for the parent is impacted by\nthe time when an event/PMU is added. While the order for a child is\nimpacted by the event order in the pinned_groups and flexible_groups. So\nthe order of pmu_ctx_list in the parent and child may be different.\n\nTo fix this problem, insert the perf_event_pmu_context to its proper place\nafter iteration of the pmu_ctx_list.\n\nThe follow testcase can trigger above warning:\n\n # perf record -e cycles --call-graph lbr -- taskset -c 3 ./a.out \u0026\n # perf stat -e cpu-clock,cs -p xxx // xxx is the pid of a.out\n\n test.c\n\n void main() {\n        int count = 0;\n        pid_t pid;\n\n        printf(\"%d running\\n\", getpid());\n        sleep(30);\n        printf(\"running\\n\");\n\n        pid = fork();\n        if (pid == -1) {\n                printf(\"fork error\\n\");\n                return;\n        }\n        if (pid == 0) {\n                while (1) {\n                        count++;\n                }\n        } else {\n                while (1) {\n                        count++;\n                }\n        }\n }\n\nThe testcase first opens an LBR event, so it will allocate task_ctx_data,\nand then open tracepoint and software events, so the parent context will\nhave 3 different perf_event_pmu_contexts. On inheritance, child ctx will\ninsert the perf_event_pmu_context in another order and the warning will\ntrigger.\n\n[ mingo: Tidied up the changelog. ]",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
          "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21895",
          "url": "https://www.suse.com/security/cve/CVE-2025-21895"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1240585 for CVE-2025-21895",
          "url": "https://bugzilla.suse.com/1240585"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-25T09:37:28Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-21895"
    },
    {
      "cve": "CVE-2025-21905",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21905"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: iwlwifi: limit printed string from FW file\n\nThere\u0027s no guarantee here that the file is always with a\nNUL-termination, so reading the string may read beyond the\nend of the TLV. If that\u0027s the last TLV in the file, it can\nperhaps even read beyond the end of the file buffer.\n\nFix that by limiting the print format to the size of the\nbuffer we have.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
          "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21905",
          "url": "https://www.suse.com/security/cve/CVE-2025-21905"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1240575 for CVE-2025-21905",
          "url": "https://bugzilla.suse.com/1240575"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-25T09:37:28Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-21905"
    },
    {
      "cve": "CVE-2025-21906",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21906"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: iwlwifi: mvm: clean up ROC on failure\n\nIf the firmware fails to start the session protection, then we\ndo call iwl_mvm_roc_finished() here, but that won\u0027t do anything\nat all because IWL_MVM_STATUS_ROC_P2P_RUNNING was never set.\nSet IWL_MVM_STATUS_ROC_P2P_RUNNING in the failure/stop path.\nIf it started successfully before, it\u0027s already set, so that\ndoesn\u0027t matter, and if it didn\u0027t start it needs to be set to\nclean up.\n\nNot doing so will lead to a WARN_ON() later on a fresh remain-\non-channel, since the link is already active when activated as\nit was never deactivated.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
          "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21906",
          "url": "https://www.suse.com/security/cve/CVE-2025-21906"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1240587 for CVE-2025-21906",
          "url": "https://bugzilla.suse.com/1240587"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-25T09:37:28Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-21906"
    },
    {
      "cve": "CVE-2025-21908",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21908"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFS: fix nfs_release_folio() to not deadlock via kcompactd writeback\n\nAdd PF_KCOMPACTD flag and current_is_kcompactd() helper to check for it so\nnfs_release_folio() can skip calling nfs_wb_folio() from kcompactd.\n\nOtherwise NFS can deadlock waiting for kcompactd enduced writeback which\nrecurses back to NFS (which triggers writeback to NFSD via NFS loopback\nmount on the same host, NFSD blocks waiting for XFS\u0027s call to\n__filemap_get_folio):\n\n6070.550357] INFO: task kcompactd0:58 blocked for more than 4435 seconds.\n\n{---\n[58] \"kcompactd0\"\n[\u003c0\u003e] folio_wait_bit+0xe8/0x200\n[\u003c0\u003e] folio_wait_writeback+0x2b/0x80\n[\u003c0\u003e] nfs_wb_folio+0x80/0x1b0 [nfs]\n[\u003c0\u003e] nfs_release_folio+0x68/0x130 [nfs]\n[\u003c0\u003e] split_huge_page_to_list_to_order+0x362/0x840\n[\u003c0\u003e] migrate_pages_batch+0x43d/0xb90\n[\u003c0\u003e] migrate_pages_sync+0x9a/0x240\n[\u003c0\u003e] migrate_pages+0x93c/0x9f0\n[\u003c0\u003e] compact_zone+0x8e2/0x1030\n[\u003c0\u003e] compact_node+0xdb/0x120\n[\u003c0\u003e] kcompactd+0x121/0x2e0\n[\u003c0\u003e] kthread+0xcf/0x100\n[\u003c0\u003e] ret_from_fork+0x31/0x40\n[\u003c0\u003e] ret_from_fork_asm+0x1a/0x30\n---}\n\n[akpm@linux-foundation.org: fix build]",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
          "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21908",
          "url": "https://www.suse.com/security/cve/CVE-2025-21908"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1240600 for CVE-2025-21908",
          "url": "https://bugzilla.suse.com/1240600"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-25T09:37:28Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-21908"
    },
    {
      "cve": "CVE-2025-21909",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21909"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: nl80211: reject cooked mode if it is set along with other flags\n\nIt is possible to set both MONITOR_FLAG_COOK_FRAMES and MONITOR_FLAG_ACTIVE\nflags simultaneously on the same monitor interface from the userspace. This\ncauses a sub-interface to be created with no IEEE80211_SDATA_IN_DRIVER bit\nset because the monitor interface is in the cooked state and it takes\nprecedence over all other states. When the interface is then being deleted\nthe kernel calls WARN_ONCE() from check_sdata_in_driver() because of missing\nthat bit.\n\nFix this by rejecting MONITOR_FLAG_COOK_FRAMES if it is set along with\nother flags.\n\nFound by Linux Verification Center (linuxtesting.org) with Syzkaller.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
          "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21909",
          "url": "https://www.suse.com/security/cve/CVE-2025-21909"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1240590 for CVE-2025-21909",
          "url": "https://bugzilla.suse.com/1240590"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-25T09:37:28Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-21909"
    },
    {
      "cve": "CVE-2025-21910",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21910"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: cfg80211: regulatory: improve invalid hints checking\n\nSyzbot keeps reporting an issue [1] that occurs when erroneous symbols\nsent from userspace get through into user_alpha2[] via\nregulatory_hint_user() call. Such invalid regulatory hints should be\nrejected.\n\nWhile a sanity check from commit 47caf685a685 (\"cfg80211: regulatory:\nreject invalid hints\") looks to be enough to deter these very cases,\nthere is a way to get around it due to 2 reasons.\n\n1) The way isalpha() works, symbols other than latin lower and\nupper letters may be used to determine a country/domain.\nFor instance, greek letters will also be considered upper/lower\nletters and for such characters isalpha() will return true as well.\nHowever, ISO-3166-1 alpha2 codes should only hold latin\ncharacters.\n\n2) While processing a user regulatory request, between\nreg_process_hint_user() and regulatory_hint_user() there happens to\nbe a call to queue_regulatory_request() which modifies letters in\nrequest-\u003ealpha2[] with toupper(). This works fine for latin symbols,\nless so for weird letter characters from the second part of _ctype[].\n\nSyzbot triggers a warning in is_user_regdom_saved() by first sending\nover an unexpected non-latin letter that gets malformed by toupper()\ninto a character that ends up failing isalpha() check.\n\nPrevent this by enhancing is_an_alpha2() to ensure that incoming\nsymbols are latin letters and nothing else.\n\n[1] Syzbot report:\n------------[ cut here ]------------\nUnexpected user alpha2: A\ufffd\nWARNING: CPU: 1 PID: 964 at net/wireless/reg.c:442 is_user_regdom_saved net/wireless/reg.c:440 [inline]\nWARNING: CPU: 1 PID: 964 at net/wireless/reg.c:442 restore_alpha2 net/wireless/reg.c:3424 [inline]\nWARNING: CPU: 1 PID: 964 at net/wireless/reg.c:442 restore_regulatory_settings+0x3c0/0x1e50 net/wireless/reg.c:3516\nModules linked in:\nCPU: 1 UID: 0 PID: 964 Comm: kworker/1:2 Not tainted 6.12.0-rc5-syzkaller-00044-gc1e939a21eb1 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024\nWorkqueue: events_power_efficient crda_timeout_work\nRIP: 0010:is_user_regdom_saved net/wireless/reg.c:440 [inline]\nRIP: 0010:restore_alpha2 net/wireless/reg.c:3424 [inline]\nRIP: 0010:restore_regulatory_settings+0x3c0/0x1e50 net/wireless/reg.c:3516\n...\nCall Trace:\n \u003cTASK\u003e\n crda_timeout_work+0x27/0x50 net/wireless/reg.c:542\n process_one_work kernel/workqueue.c:3229 [inline]\n process_scheduled_works+0xa65/0x1850 kernel/workqueue.c:3310\n worker_thread+0x870/0xd30 kernel/workqueue.c:3391\n kthread+0x2f2/0x390 kernel/kthread.c:389\n ret_from_fork+0x4d/0x80 arch/x86/kernel/process.c:147\n ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244\n \u003c/TASK\u003e",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
          "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21910",
          "url": "https://www.suse.com/security/cve/CVE-2025-21910"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1240583 for CVE-2025-21910",
          "url": "https://bugzilla.suse.com/1240583"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-25T09:37:28Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-21910"
    },
    {
      "cve": "CVE-2025-21912",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21912"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ngpio: rcar: Use raw_spinlock to protect register access\n\nUse raw_spinlock in order to fix spurious messages about invalid context\nwhen spinlock debugging is enabled. The lock is only used to serialize\nregister access.\n\n    [    4.239592] =============================\n    [    4.239595] [ BUG: Invalid wait context ]\n    [    4.239599] 6.13.0-rc7-arm64-renesas-05496-gd088502a519f #35 Not tainted\n    [    4.239603] -----------------------------\n    [    4.239606] kworker/u8:5/76 is trying to lock:\n    [    4.239609] ffff0000091898a0 (\u0026p-\u003elock){....}-{3:3}, at: gpio_rcar_config_interrupt_input_mode+0x34/0x164\n    [    4.239641] other info that might help us debug this:\n    [    4.239643] context-{5:5}\n    [    4.239646] 5 locks held by kworker/u8:5/76:\n    [    4.239651]  #0: ffff0000080fb148 ((wq_completion)async){+.+.}-{0:0}, at: process_one_work+0x190/0x62c\n    [    4.250180] OF: /soc/sound@ec500000/ports/port@0/endpoint: Read of boolean property \u0027frame-master\u0027 with a value.\n    [    4.254094]  #1: ffff80008299bd80 ((work_completion)(\u0026entry-\u003ework)){+.+.}-{0:0}, at: process_one_work+0x1b8/0x62c\n    [    4.254109]  #2: ffff00000920c8f8\n    [    4.258345] OF: /soc/sound@ec500000/ports/port@1/endpoint: Read of boolean property \u0027bitclock-master\u0027 with a value.\n    [    4.264803]  (\u0026dev-\u003emutex){....}-{4:4}, at: __device_attach_async_helper+0x3c/0xdc\n    [    4.264820]  #3: ffff00000a50ca40 (request_class#2){+.+.}-{4:4}, at: __setup_irq+0xa0/0x690\n    [    4.264840]  #4:\n    [    4.268872] OF: /soc/sound@ec500000/ports/port@1/endpoint: Read of boolean property \u0027frame-master\u0027 with a value.\n    [    4.273275] ffff00000a50c8c8 (lock_class){....}-{2:2}, at: __setup_irq+0xc4/0x690\n    [    4.296130] renesas_sdhi_internal_dmac ee100000.mmc: mmc1 base at 0x00000000ee100000, max clock rate 200 MHz\n    [    4.304082] stack backtrace:\n    [    4.304086] CPU: 1 UID: 0 PID: 76 Comm: kworker/u8:5 Not tainted 6.13.0-rc7-arm64-renesas-05496-gd088502a519f #35\n    [    4.304092] Hardware name: Renesas Salvator-X 2nd version board based on r8a77965 (DT)\n    [    4.304097] Workqueue: async async_run_entry_fn\n    [    4.304106] Call trace:\n    [    4.304110]  show_stack+0x14/0x20 (C)\n    [    4.304122]  dump_stack_lvl+0x6c/0x90\n    [    4.304131]  dump_stack+0x14/0x1c\n    [    4.304138]  __lock_acquire+0xdfc/0x1584\n    [    4.426274]  lock_acquire+0x1c4/0x33c\n    [    4.429942]  _raw_spin_lock_irqsave+0x5c/0x80\n    [    4.434307]  gpio_rcar_config_interrupt_input_mode+0x34/0x164\n    [    4.440061]  gpio_rcar_irq_set_type+0xd4/0xd8\n    [    4.444422]  __irq_set_trigger+0x5c/0x178\n    [    4.448435]  __setup_irq+0x2e4/0x690\n    [    4.452012]  request_threaded_irq+0xc4/0x190\n    [    4.456285]  devm_request_threaded_irq+0x7c/0xf4\n    [    4.459398] ata1: link resume succeeded after 1 retries\n    [    4.460902]  mmc_gpiod_request_cd_irq+0x68/0xe0\n    [    4.470660]  mmc_start_host+0x50/0xac\n    [    4.474327]  mmc_add_host+0x80/0xe4\n    [    4.477817]  tmio_mmc_host_probe+0x2b0/0x440\n    [    4.482094]  renesas_sdhi_probe+0x488/0x6f4\n    [    4.486281]  renesas_sdhi_internal_dmac_probe+0x60/0x78\n    [    4.491509]  platform_probe+0x64/0xd8\n    [    4.495178]  really_probe+0xb8/0x2a8\n    [    4.498756]  __driver_probe_device+0x74/0x118\n    [    4.503116]  driver_probe_device+0x3c/0x154\n    [    4.507303]  __device_attach_driver+0xd4/0x160\n    [    4.511750]  bus_for_each_drv+0x84/0xe0\n    [    4.515588]  __device_attach_async_helper+0xb0/0xdc\n    [    4.520470]  async_run_entry_fn+0x30/0xd8\n    [    4.524481]  process_one_work+0x210/0x62c\n    [    4.528494]  worker_thread+0x1ac/0x340\n    [    4.532245]  kthread+0x10c/0x110\n    [    4.535476]  ret_from_fork+0x10/0x20",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
          "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21912",
          "url": "https://www.suse.com/security/cve/CVE-2025-21912"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1240584 for CVE-2025-21912",
          "url": "https://bugzilla.suse.com/1240584"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-25T09:37:28Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-21912"
    },
    {
      "cve": "CVE-2025-21913",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21913"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/amd_nb: Use rdmsr_safe() in amd_get_mmconfig_range()\n\nXen doesn\u0027t offer MSR_FAM10H_MMIO_CONF_BASE to all guests.  This results\nin the following warning:\n\n  unchecked MSR access error: RDMSR from 0xc0010058 at rIP: 0xffffffff8101d19f (xen_do_read_msr+0x7f/0xa0)\n  Call Trace:\n   xen_read_msr+0x1e/0x30\n   amd_get_mmconfig_range+0x2b/0x80\n   quirk_amd_mmconfig_area+0x28/0x100\n   pnp_fixup_device+0x39/0x50\n   __pnp_add_device+0xf/0x150\n   pnp_add_device+0x3d/0x100\n   pnpacpi_add_device_handler+0x1f9/0x280\n   acpi_ns_get_device_callback+0x104/0x1c0\n   acpi_ns_walk_namespace+0x1d0/0x260\n   acpi_get_devices+0x8a/0xb0\n   pnpacpi_init+0x50/0x80\n   do_one_initcall+0x46/0x2e0\n   kernel_init_freeable+0x1da/0x2f0\n   kernel_init+0x16/0x1b0\n   ret_from_fork+0x30/0x50\n   ret_from_fork_asm+0x1b/0x30\n\nbased on quirks for a \"PNP0c01\" device.  Treating MMCFG as disabled is the\nright course of action, so no change is needed there.\n\nThis was most likely exposed by fixing the Xen MSR accessors to not be\nsilently-safe.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
          "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21913",
          "url": "https://www.suse.com/security/cve/CVE-2025-21913"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1240591 for CVE-2025-21913",
          "url": "https://bugzilla.suse.com/1240591"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-25T09:37:28Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-21913"
    },
    {
      "cve": "CVE-2025-21914",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21914"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nslimbus: messaging: Free transaction ID in delayed interrupt scenario\n\nIn case of interrupt delay for any reason, slim_do_transfer()\nreturns timeout error but the transaction ID (TID) is not freed.\nThis results into invalid memory access inside\nqcom_slim_ngd_rx_msgq_cb() due to invalid TID.\n\nFix the issue by freeing the TID in slim_do_transfer() before\nreturning timeout error to avoid invalid memory access.\n\nCall trace:\n__memcpy_fromio+0x20/0x190\nqcom_slim_ngd_rx_msgq_cb+0x130/0x290 [slim_qcom_ngd_ctrl]\nvchan_complete+0x2a0/0x4a0\ntasklet_action_common+0x274/0x700\ntasklet_action+0x28/0x3c\n_stext+0x188/0x620\nrun_ksoftirqd+0x34/0x74\nsmpboot_thread_fn+0x1d8/0x464\nkthread+0x178/0x238\nret_from_fork+0x10/0x20\nCode: aa0003e8 91000429 f100044a 3940002b (3800150b)\n---[ end trace 0fe00bec2b975c99 ]---\nKernel panic - not syncing: Oops: Fatal exception in interrupt.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
          "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21914",
          "url": "https://www.suse.com/security/cve/CVE-2025-21914"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1240595 for CVE-2025-21914",
          "url": "https://bugzilla.suse.com/1240595"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-25T09:37:28Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-21914"
    },
    {
      "cve": "CVE-2025-21915",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21915"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncdx: Fix possible UAF error in driver_override_show()\n\nFixed a possible UAF problem in driver_override_show() in drivers/cdx/cdx.c\n\nThis function driver_override_show() is part of DEVICE_ATTR_RW, which\nincludes both driver_override_show() and driver_override_store().\nThese functions can be executed concurrently in sysfs.\n\nThe driver_override_store() function uses driver_set_override() to\nupdate the driver_override value, and driver_set_override() internally\nlocks the device (device_lock(dev)). If driver_override_show() reads\ncdx_dev-\u003edriver_override without locking, it could potentially access\na freed pointer if driver_override_store() frees the string\nconcurrently. This could lead to printing a kernel address, which is a\nsecurity risk since DEVICE_ATTR can be read by all users.\n\nAdditionally, a similar pattern is used in drivers/amba/bus.c, as well\nas many other bus drivers, where device_lock() is taken in the show\nfunction, and it has been working without issues.\n\nThis potential bug was detected by our experimental static analysis\ntool, which analyzes locking APIs and paired functions to identify\ndata races and atomicity violations.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
          "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21915",
          "url": "https://www.suse.com/security/cve/CVE-2025-21915"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1240594 for CVE-2025-21915",
          "url": "https://bugzilla.suse.com/1240594"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-25T09:37:28Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-21915"
    },
    {
      "cve": "CVE-2025-21916",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21916"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: atm: cxacru: fix a flaw in existing endpoint checks\n\nSyzbot once again identified a flaw in usb endpoint checking, see [1].\nThis time the issue stems from a commit authored by me (2eabb655a968\n(\"usb: atm: cxacru: fix endpoint checking in cxacru_bind()\")).\n\nWhile using usb_find_common_endpoints() may usually be enough to\ndiscard devices with wrong endpoints, in this case one needs more\nthan just finding and identifying the sufficient number of endpoints\nof correct types - one needs to check the endpoint\u0027s address as well.\n\nSince cxacru_bind() fills URBs with CXACRU_EP_CMD address in mind,\nswitch the endpoint verification approach to usb_check_XXX_endpoints()\ninstead to fix incomplete ep testing.\n\n[1] Syzbot report:\nusb 5-1: BOGUS urb xfer, pipe 3 != type 1\nWARNING: CPU: 0 PID: 1378 at drivers/usb/core/urb.c:504 usb_submit_urb+0xc4e/0x18c0 drivers/usb/core/urb.c:503\n...\nRIP: 0010:usb_submit_urb+0xc4e/0x18c0 drivers/usb/core/urb.c:503\n...\nCall Trace:\n \u003cTASK\u003e\n cxacru_cm+0x3c8/0xe50 drivers/usb/atm/cxacru.c:649\n cxacru_card_status drivers/usb/atm/cxacru.c:760 [inline]\n cxacru_bind+0xcf9/0x1150 drivers/usb/atm/cxacru.c:1223\n usbatm_usb_probe+0x314/0x1d30 drivers/usb/atm/usbatm.c:1058\n cxacru_usb_probe+0x184/0x220 drivers/usb/atm/cxacru.c:1377\n usb_probe_interface+0x641/0xbb0 drivers/usb/core/driver.c:396\n really_probe+0x2b9/0xad0 drivers/base/dd.c:658\n __driver_probe_device+0x1a2/0x390 drivers/base/dd.c:800\n driver_probe_device+0x50/0x430 drivers/base/dd.c:830\n...",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
          "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21916",
          "url": "https://www.suse.com/security/cve/CVE-2025-21916"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1240582 for CVE-2025-21916",
          "url": "https://bugzilla.suse.com/1240582"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-25T09:37:28Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-21916"
    },
    {
      "cve": "CVE-2025-21917",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21917"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: renesas_usbhs: Flush the notify_hotplug_work\n\nWhen performing continuous unbind/bind operations on the USB drivers\navailable on the Renesas RZ/G2L SoC, a kernel crash with the message\n\"Unable to handle kernel NULL pointer dereference at virtual address\"\nmay occur. This issue points to the usbhsc_notify_hotplug() function.\n\nFlush the delayed work to avoid its execution when driver resources are\nunavailable.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
          "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21917",
          "url": "https://www.suse.com/security/cve/CVE-2025-21917"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1240596 for CVE-2025-21917",
          "url": "https://bugzilla.suse.com/1240596"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-25T09:37:28Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-21917"
    },
    {
      "cve": "CVE-2025-21918",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21918"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: typec: ucsi: Fix NULL pointer access\n\nResources should be released only after all threads that utilize them\nhave been destroyed.\nThis commit ensures that resources are not released prematurely by waiting\nfor the associated workqueue to complete before deallocating them.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
          "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21918",
          "url": "https://www.suse.com/security/cve/CVE-2025-21918"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1240592 for CVE-2025-21918",
          "url": "https://bugzilla.suse.com/1240592"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-25T09:37:28Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-21918"
    },
    {
      "cve": "CVE-2025-21922",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21922"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nppp: Fix KMSAN uninit-value warning with bpf\n\nSyzbot caught an \"KMSAN: uninit-value\" warning [1], which is caused by the\nppp driver not initializing a 2-byte header when using socket filter.\n\nThe following code can generate a PPP filter BPF program:\n\u0027\u0027\u0027\nstruct bpf_program fp;\npcap_t *handle;\nhandle = pcap_open_dead(DLT_PPP_PPPD, 65535);\npcap_compile(handle, \u0026fp, \"ip and outbound\", 0, 0);\nbpf_dump(\u0026fp, 1);\n\u0027\u0027\u0027\nIts output is:\n\u0027\u0027\u0027\n(000) ldh [2]\n(001) jeq #0x21 jt 2 jf 5\n(002) ldb [0]\n(003) jeq #0x1 jt 4 jf 5\n(004) ret #65535\n(005) ret #0\n\u0027\u0027\u0027\nWen can find similar code at the following link:\nhttps://github.com/ppp-project/ppp/blob/master/pppd/options.c#L1680\nThe maintainer of this code repository is also the original maintainer\nof the ppp driver.\n\nAs you can see the BPF program skips 2 bytes of data and then reads the\n\u0027Protocol\u0027 field to determine if it\u0027s an IP packet. Then it read the first\nbyte of the first 2 bytes to determine the direction.\n\nThe issue is that only the first byte indicating direction is initialized\nin current ppp driver code while the second byte is not initialized.\n\nFor normal BPF programs generated by libpcap, uninitialized data won\u0027t be\nused, so it\u0027s not a problem. However, for carefully crafted BPF programs,\nsuch as those generated by syzkaller [2], which start reading from offset\n0, the uninitialized data will be used and caught by KMSAN.\n\n[1] https://syzkaller.appspot.com/bug?extid=853242d9c9917165d791\n[2] https://syzkaller.appspot.com/text?tag=ReproC\u0026x=11994913980000",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
          "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21922",
          "url": "https://www.suse.com/security/cve/CVE-2025-21922"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1240639 for CVE-2025-21922",
          "url": "https://bugzilla.suse.com/1240639"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-25T09:37:28Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-21922"
    },
    {
      "cve": "CVE-2025-21923",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21923"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: hid-steam: Fix use-after-free when detaching device\n\nWhen a hid-steam device is removed it must clean up the client_hdev used for\nintercepting hidraw access. This can lead to scheduling deferred work to\nreattach the input device. Though the cleanup cancels the deferred work, this\nwas done before the client_hdev itself is cleaned up, so it gets rescheduled.\nThis patch fixes the ordering to make sure the deferred work is properly\ncanceled.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
          "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21923",
          "url": "https://www.suse.com/security/cve/CVE-2025-21923"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1240691 for CVE-2025-21923",
          "url": "https://bugzilla.suse.com/1240691"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-25T09:37:28Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-21923"
    },
    {
      "cve": "CVE-2025-21924",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21924"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: hns3: make sure ptp clock is unregister and freed if hclge_ptp_get_cycle returns an error\n\nDuring the initialization of ptp, hclge_ptp_get_cycle might return an error\nand returned directly without unregister clock and free it. To avoid that,\ncall hclge_ptp_destroy_clock to unregist and free clock if\nhclge_ptp_get_cycle failed.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
          "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21924",
          "url": "https://www.suse.com/security/cve/CVE-2025-21924"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1240720 for CVE-2025-21924",
          "url": "https://bugzilla.suse.com/1240720"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-25T09:37:28Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-21924"
    },
    {
      "cve": "CVE-2025-21927",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21927"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvme-tcp: fix potential memory corruption in nvme_tcp_recv_pdu()\n\nnvme_tcp_recv_pdu() doesn\u0027t check the validity of the header length.\nWhen header digests are enabled, a target might send a packet with an\ninvalid header length (e.g. 255), causing nvme_tcp_verify_hdgst()\nto access memory outside the allocated area and cause memory corruptions\nby overwriting it with the calculated digest.\n\nFix this by rejecting packets with an unexpected header length.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
          "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21927",
          "url": "https://www.suse.com/security/cve/CVE-2025-21927"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1240714 for CVE-2025-21927",
          "url": "https://bugzilla.suse.com/1240714"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-25T09:37:28Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-21927"
    },
    {
      "cve": "CVE-2025-21928",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21928"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: intel-ish-hid: Fix use-after-free issue in ishtp_hid_remove()\n\nThe system can experience a random crash a few minutes after the driver is\nremoved. This issue occurs due to improper handling of memory freeing in\nthe ishtp_hid_remove() function.\n\nThe function currently frees the `driver_data` directly within the loop\nthat destroys the HID devices, which can lead to accessing freed memory.\nSpecifically, `hid_destroy_device()` uses `driver_data` when it calls\n`hid_ishtp_set_feature()` to power off the sensor, so freeing\n`driver_data` beforehand can result in accessing invalid memory.\n\nThis patch resolves the issue by storing the `driver_data` in a temporary\nvariable before calling `hid_destroy_device()`, and then freeing the\n`driver_data` after the device is destroyed.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
          "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21928",
          "url": "https://www.suse.com/security/cve/CVE-2025-21928"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1240722 for CVE-2025-21928",
          "url": "https://bugzilla.suse.com/1240722"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-25T09:37:28Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-21928"
    },
    {
      "cve": "CVE-2025-21930",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21930"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: iwlwifi: mvm: don\u0027t try to talk to a dead firmware\n\nThis fixes:\n\n bad state = 0\n WARNING: CPU: 10 PID: 702 at drivers/net/wireless/inel/iwlwifi/iwl-trans.c:178 iwl_trans_send_cmd+0xba/0xe0 [iwlwifi]\n Call Trace:\n  \u003cTASK\u003e\n  ? __warn+0xca/0x1c0\n  ? iwl_trans_send_cmd+0xba/0xe0 [iwlwifi 64fa9ad799a0e0d2ba53d4af93a53ad9a531f8d4]\n  iwl_fw_dbg_clear_monitor_buf+0xd7/0x110 [iwlwifi 64fa9ad799a0e0d2ba53d4af93a53ad9a531f8d4]\n  _iwl_dbgfs_fw_dbg_clear_write+0xe2/0x120 [iwlmvm 0e8adb18cea92d2c341766bcc10b18699290068a]\n\nAsk whether the firmware is alive before sending a command.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
          "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21930",
          "url": "https://www.suse.com/security/cve/CVE-2025-21930"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1240715 for CVE-2025-21930",
          "url": "https://bugzilla.suse.com/1240715"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-25T09:37:28Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-21930"
    },
    {
      "cve": "CVE-2025-21934",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21934"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nrapidio: fix an API misues when rio_add_net() fails\n\nrio_add_net() calls device_register() and fails when device_register()\nfails.  Thus, put_device() should be used rather than kfree().  Add\n\"mport-\u003enet = NULL;\" to avoid a use after free issue.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
          "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21934",
          "url": "https://www.suse.com/security/cve/CVE-2025-21934"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1240708 for CVE-2025-21934",
          "url": "https://bugzilla.suse.com/1240708"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-25T09:37:28Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-21934"
    },
    {
      "cve": "CVE-2025-21935",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21935"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nrapidio: add check for rio_add_net() in rio_scan_alloc_net()\n\nThe return value of rio_add_net() should be checked.  If it fails,\nput_device() should be called to free the memory and give up the reference\ninitialized in rio_add_net().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
          "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21935",
          "url": "https://www.suse.com/security/cve/CVE-2025-21935"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1240700 for CVE-2025-21935",
          "url": "https://bugzilla.suse.com/1240700"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-25T09:37:28Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-21935"
    },
    {
      "cve": "CVE-2025-21936",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21936"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: Add check for mgmt_alloc_skb() in mgmt_device_connected()\n\nAdd check for the return value of mgmt_alloc_skb() in\nmgmt_device_connected() to prevent null pointer dereference.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
          "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21936",
          "url": "https://www.suse.com/security/cve/CVE-2025-21936"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1240716 for CVE-2025-21936",
          "url": "https://bugzilla.suse.com/1240716"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-25T09:37:28Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-21936"
    },
    {
      "cve": "CVE-2025-21937",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21937"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: Add check for mgmt_alloc_skb() in mgmt_remote_name()\n\nAdd check for the return value of mgmt_alloc_skb() in\nmgmt_remote_name() to prevent null pointer dereference.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
          "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21937",
          "url": "https://www.suse.com/security/cve/CVE-2025-21937"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1240643 for CVE-2025-21937",
          "url": "https://bugzilla.suse.com/1240643"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-25T09:37:28Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-21937"
    },
    {
      "cve": "CVE-2025-21941",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21941"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Fix null check for pipe_ctx-\u003eplane_state in resource_build_scaling_params\n\nNull pointer dereference issue could occur when pipe_ctx-\u003eplane_state\nis null. The fix adds a check to ensure \u0027pipe_ctx-\u003eplane_state\u0027 is not\nnull before accessing. This prevents a null pointer dereference.\n\nFound by code review.\n\n(cherry picked from commit 63e6a77ccf239337baa9b1e7787cde9fa0462092)",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
          "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21941",
          "url": "https://www.suse.com/security/cve/CVE-2025-21941"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1240701 for CVE-2025-21941",
          "url": "https://bugzilla.suse.com/1240701"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-25T09:37:28Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-21941"
    },
    {
      "cve": "CVE-2025-21943",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21943"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ngpio: aggregator: protect driver attr handlers against module unload\n\nBoth new_device_store and delete_device_store touch module global\nresources (e.g. gpio_aggregator_lock). To prevent race conditions with\nmodule unload, a reference needs to be held.\n\nAdd try_module_get() in these handlers.\n\nFor new_device_store, this eliminates what appears to be the most dangerous\nscenario: if an id is allocated from gpio_aggregator_idr but\nplatform_device_register has not yet been called or completed, a concurrent\nmodule unload could fail to unregister/delete the device, leaving behind a\ndangling platform device/GPIO forwarder. This can result in various issues.\nThe following simple reproducer demonstrates these problems:\n\n  #!/bin/bash\n  while :; do\n    # note: whether \u0027gpiochip0 0\u0027 exists or not does not matter.\n    echo \u0027gpiochip0 0\u0027 \u003e /sys/bus/platform/drivers/gpio-aggregator/new_device\n  done \u0026\n  while :; do\n    modprobe gpio-aggregator\n    modprobe -r gpio-aggregator\n  done \u0026\n  wait\n\n  Starting with the following warning, several kinds of warnings will appear\n  and the system may become unstable:\n\n  ------------[ cut here ]------------\n  list_del corruption, ffff888103e2e980-\u003enext is LIST_POISON1 (dead000000000100)\n  WARNING: CPU: 1 PID: 1327 at lib/list_debug.c:56 __list_del_entry_valid_or_report+0xa3/0x120\n  [...]\n  RIP: 0010:__list_del_entry_valid_or_report+0xa3/0x120\n  [...]\n  Call Trace:\n   \u003cTASK\u003e\n   ? __list_del_entry_valid_or_report+0xa3/0x120\n   ? __warn.cold+0x93/0xf2\n   ? __list_del_entry_valid_or_report+0xa3/0x120\n   ? report_bug+0xe6/0x170\n   ? __irq_work_queue_local+0x39/0xe0\n   ? handle_bug+0x58/0x90\n   ? exc_invalid_op+0x13/0x60\n   ? asm_exc_invalid_op+0x16/0x20\n   ? __list_del_entry_valid_or_report+0xa3/0x120\n   gpiod_remove_lookup_table+0x22/0x60\n   new_device_store+0x315/0x350 [gpio_aggregator]\n   kernfs_fop_write_iter+0x137/0x1f0\n   vfs_write+0x262/0x430\n   ksys_write+0x60/0xd0\n   do_syscall_64+0x6c/0x180\n   entry_SYSCALL_64_after_hwframe+0x76/0x7e\n   [...]\n   \u003c/TASK\u003e\n  ---[ end trace 0000000000000000 ]---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
          "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21943",
          "url": "https://www.suse.com/security/cve/CVE-2025-21943"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1240647 for CVE-2025-21943",
          "url": "https://bugzilla.suse.com/1240647"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-25T09:37:28Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-21943"
    },
    {
      "cve": "CVE-2025-21948",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21948"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: appleir: Fix potential NULL dereference at raw event handle\n\nSyzkaller reports a NULL pointer dereference issue in input_event().\n\nBUG: KASAN: null-ptr-deref in instrument_atomic_read include/linux/instrumented.h:68 [inline]\nBUG: KASAN: null-ptr-deref in _test_bit include/asm-generic/bitops/instrumented-non-atomic.h:141 [inline]\nBUG: KASAN: null-ptr-deref in is_event_supported drivers/input/input.c:67 [inline]\nBUG: KASAN: null-ptr-deref in input_event+0x42/0xa0 drivers/input/input.c:395\nRead of size 8 at addr 0000000000000028 by task syz-executor199/2949\n\nCPU: 0 UID: 0 PID: 2949 Comm: syz-executor199 Not tainted 6.13.0-rc4-syzkaller-00076-gf097a36ef88d #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024\nCall Trace:\n \u003cIRQ\u003e\n __dump_stack lib/dump_stack.c:94 [inline]\n dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:120\n kasan_report+0xd9/0x110 mm/kasan/report.c:602\n check_region_inline mm/kasan/generic.c:183 [inline]\n kasan_check_range+0xef/0x1a0 mm/kasan/generic.c:189\n instrument_atomic_read include/linux/instrumented.h:68 [inline]\n _test_bit include/asm-generic/bitops/instrumented-non-atomic.h:141 [inline]\n is_event_supported drivers/input/input.c:67 [inline]\n input_event+0x42/0xa0 drivers/input/input.c:395\n input_report_key include/linux/input.h:439 [inline]\n key_down drivers/hid/hid-appleir.c:159 [inline]\n appleir_raw_event+0x3e5/0x5e0 drivers/hid/hid-appleir.c:232\n __hid_input_report.constprop.0+0x312/0x440 drivers/hid/hid-core.c:2111\n hid_ctrl+0x49f/0x550 drivers/hid/usbhid/hid-core.c:484\n __usb_hcd_giveback_urb+0x389/0x6e0 drivers/usb/core/hcd.c:1650\n usb_hcd_giveback_urb+0x396/0x450 drivers/usb/core/hcd.c:1734\n dummy_timer+0x17f7/0x3960 drivers/usb/gadget/udc/dummy_hcd.c:1993\n __run_hrtimer kernel/time/hrtimer.c:1739 [inline]\n __hrtimer_run_queues+0x20a/0xae0 kernel/time/hrtimer.c:1803\n hrtimer_run_softirq+0x17d/0x350 kernel/time/hrtimer.c:1820\n handle_softirqs+0x206/0x8d0 kernel/softirq.c:561\n __do_softirq kernel/softirq.c:595 [inline]\n invoke_softirq kernel/softirq.c:435 [inline]\n __irq_exit_rcu+0xfa/0x160 kernel/softirq.c:662\n irq_exit_rcu+0x9/0x30 kernel/softirq.c:678\n instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1049 [inline]\n sysvec_apic_timer_interrupt+0x90/0xb0 arch/x86/kernel/apic/apic.c:1049\n \u003c/IRQ\u003e\n \u003cTASK\u003e\n asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702\n __mod_timer+0x8f6/0xdc0 kernel/time/timer.c:1185\n add_timer+0x62/0x90 kernel/time/timer.c:1295\n schedule_timeout+0x11f/0x280 kernel/time/sleep_timeout.c:98\n usbhid_wait_io+0x1c7/0x380 drivers/hid/usbhid/hid-core.c:645\n usbhid_init_reports+0x19f/0x390 drivers/hid/usbhid/hid-core.c:784\n hiddev_ioctl+0x1133/0x15b0 drivers/hid/usbhid/hiddev.c:794\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:906 [inline]\n __se_sys_ioctl fs/ioctl.c:892 [inline]\n __x64_sys_ioctl+0x190/0x200 fs/ioctl.c:892\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n \u003c/TASK\u003e\n\nThis happens due to the malformed report items sent by the emulated device\nwhich results in a report, that has no fields, being added to the report list.\nDue to this appleir_input_configured() is never called, hidinput_connect()\nfails which results in the HID_CLAIMED_INPUT flag is not being set. However,\nit  does not make appleir_probe() fail and lets the event callback to be\ncalled without the associated input device.\n\nThus, add a check for the HID_CLAIMED_INPUT flag and leave the event hook\nearly if the driver didn\u0027t claim any input_dev for some reason. Moreover,\nsome other hid drivers accessing input_dev in their event callbacks do have\nsimilar checks, too.\n\nFound by Linux Verification Center (linuxtesting.org) with Syzkaller.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
          "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21948",
          "url": "https://www.suse.com/security/cve/CVE-2025-21948"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1240703 for CVE-2025-21948",
          "url": "https://bugzilla.suse.com/1240703"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-25T09:37:28Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-21948"
    },
    {
      "cve": "CVE-2025-21950",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21950"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrivers: virt: acrn: hsm: Use kzalloc to avoid info leak in pmcmd_ioctl\n\nIn the \"pmcmd_ioctl\" function, three memory objects allocated by\nkmalloc are initialized by \"hcall_get_cpu_state\", which are then\ncopied to user space. The initializer is indeed implemented in\n\"acrn_hypercall2\" (arch/x86/include/asm/acrn.h). There is a risk of\ninformation leakage due to uninitialized bytes.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
          "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21950",
          "url": "https://www.suse.com/security/cve/CVE-2025-21950"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1240719 for CVE-2025-21950",
          "url": "https://bugzilla.suse.com/1240719"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-25T09:37:28Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-21950"
    },
    {
      "cve": "CVE-2025-21951",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21951"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbus: mhi: host: pci_generic: Use pci_try_reset_function() to avoid deadlock\n\nThere are multiple places from where the recovery work gets scheduled\nasynchronously. Also, there are multiple places where the caller waits\nsynchronously for the recovery to be completed. One such place is during\nthe PM shutdown() callback.\n\nIf the device is not alive during recovery_work, it will try to reset the\ndevice using pci_reset_function(). This function internally will take the\ndevice_lock() first before resetting the device. By this time, if the lock\nhas already been acquired, then recovery_work will get stalled while\nwaiting for the lock. And if the lock was already acquired by the caller\nwhich waits for the recovery_work to be completed, it will lead to\ndeadlock.\n\nThis is what happened on the X1E80100 CRD device when the device died\nbefore shutdown() callback. Driver core calls the driver\u0027s shutdown()\ncallback while holding the device_lock() leading to deadlock.\n\nAnd this deadlock scenario can occur on other paths as well, like during\nthe PM suspend() callback, where the driver core would hold the\ndevice_lock() before calling driver\u0027s suspend() callback. And if the\nrecovery_work was already started, it could lead to deadlock. This is also\nobserved on the X1E80100 CRD.\n\nSo to fix both issues, use pci_try_reset_function() in recovery_work. This\nfunction first checks for the availability of the device_lock() before\ntrying to reset the device. If the lock is available, it will acquire it\nand reset the device. Otherwise, it will return -EAGAIN. If that happens,\nrecovery_work will fail with the error message \"Recovery failed\" as not\nmuch could be done.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
          "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21951",
          "url": "https://www.suse.com/security/cve/CVE-2025-21951"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1240718 for CVE-2025-21951",
          "url": "https://bugzilla.suse.com/1240718"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-25T09:37:28Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-21951"
    },
    {
      "cve": "CVE-2025-21953",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21953"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: mana: cleanup mana struct after debugfs_remove()\n\nWhen on a MANA VM hibernation is triggered, as part of hibernate_snapshot(),\nmana_gd_suspend() and mana_gd_resume() are called. If during this\nmana_gd_resume(), a failure occurs with HWC creation, mana_port_debugfs\npointer does not get reinitialized and ends up pointing to older,\ncleaned-up dentry.\nFurther in the hibernation path, as part of power_down(), mana_gd_shutdown()\nis triggered. This call, unaware of the failures in resume, tries to cleanup\nthe already cleaned up  mana_port_debugfs value and hits the following bug:\n\n[  191.359296] mana 7870:00:00.0: Shutdown was called\n[  191.359918] BUG: kernel NULL pointer dereference, address: 0000000000000098\n[  191.360584] #PF: supervisor write access in kernel mode\n[  191.361125] #PF: error_code(0x0002) - not-present page\n[  191.361727] PGD 1080ea067 P4D 0\n[  191.362172] Oops: Oops: 0002 [#1] SMP NOPTI\n[  191.362606] CPU: 11 UID: 0 PID: 1674 Comm: bash Not tainted 6.14.0-rc5+ #2\n[  191.363292] Hardware name: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 11/21/2024\n[  191.364124] RIP: 0010:down_write+0x19/0x50\n[  191.364537] Code: 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1f 44 00 00 55 48 89 e5 53 48 89 fb e8 de cd ff ff 31 c0 ba 01 00 00 00 \u003cf0\u003e 48 0f b1 13 75 16 65 48 8b 05 88 24 4c 6a 48 89 43 08 48 8b 5d\n[  191.365867] RSP: 0000:ff45fbe0c1c037b8 EFLAGS: 00010246\n[  191.366350] RAX: 0000000000000000 RBX: 0000000000000098 RCX: ffffff8100000000\n[  191.366951] RDX: 0000000000000001 RSI: 0000000000000064 RDI: 0000000000000098\n[  191.367600] RBP: ff45fbe0c1c037c0 R08: 0000000000000000 R09: 0000000000000001\n[  191.368225] R10: ff45fbe0d2b01000 R11: 0000000000000008 R12: 0000000000000000\n[  191.368874] R13: 000000000000000b R14: ff43dc27509d67c0 R15: 0000000000000020\n[  191.369549] FS:  00007dbc5001e740(0000) GS:ff43dc663f380000(0000) knlGS:0000000000000000\n[  191.370213] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[  191.370830] CR2: 0000000000000098 CR3: 0000000168e8e002 CR4: 0000000000b73ef0\n[  191.371557] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[  191.372192] DR3: 0000000000000000 DR6: 00000000fffe07f0 DR7: 0000000000000400\n[  191.372906] Call Trace:\n[  191.373262]  \u003cTASK\u003e\n[  191.373621]  ? show_regs+0x64/0x70\n[  191.374040]  ? __die+0x24/0x70\n[  191.374468]  ? page_fault_oops+0x290/0x5b0\n[  191.374875]  ? do_user_addr_fault+0x448/0x800\n[  191.375357]  ? exc_page_fault+0x7a/0x160\n[  191.375971]  ? asm_exc_page_fault+0x27/0x30\n[  191.376416]  ? down_write+0x19/0x50\n[  191.376832]  ? down_write+0x12/0x50\n[  191.377232]  simple_recursive_removal+0x4a/0x2a0\n[  191.377679]  ? __pfx_remove_one+0x10/0x10\n[  191.378088]  debugfs_remove+0x44/0x70\n[  191.378530]  mana_detach+0x17c/0x4f0\n[  191.378950]  ? __flush_work+0x1e2/0x3b0\n[  191.379362]  ? __cond_resched+0x1a/0x50\n[  191.379787]  mana_remove+0xf2/0x1a0\n[  191.380193]  mana_gd_shutdown+0x3b/0x70\n[  191.380642]  pci_device_shutdown+0x3a/0x80\n[  191.381063]  device_shutdown+0x13e/0x230\n[  191.381480]  kernel_power_off+0x35/0x80\n[  191.381890]  hibernate+0x3c6/0x470\n[  191.382312]  state_store+0xcb/0xd0\n[  191.382734]  kobj_attr_store+0x12/0x30\n[  191.383211]  sysfs_kf_write+0x3e/0x50\n[  191.383640]  kernfs_fop_write_iter+0x140/0x1d0\n[  191.384106]  vfs_write+0x271/0x440\n[  191.384521]  ksys_write+0x72/0xf0\n[  191.384924]  __x64_sys_write+0x19/0x20\n[  191.385313]  x64_sys_call+0x2b0/0x20b0\n[  191.385736]  do_syscall_64+0x79/0x150\n[  191.386146]  ? __mod_memcg_lruvec_state+0xe7/0x240\n[  191.386676]  ? __lruvec_stat_mod_folio+0x79/0xb0\n[  191.387124]  ? __pfx_lru_add+0x10/0x10\n[  191.387515]  ? queued_spin_unlock+0x9/0x10\n[  191.387937]  ? do_anonymous_page+0x33c/0xa00\n[  191.388374]  ? __handle_mm_fault+0xcf3/0x1210\n[  191.388805]  ? __count_memcg_events+0xbe/0x180\n[  191.389235]  ? handle_mm_fault+0xae/0x300\n[  19\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
          "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21953",
          "url": "https://www.suse.com/security/cve/CVE-2025-21953"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1240727 for CVE-2025-21953",
          "url": "https://bugzilla.suse.com/1240727"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-25T09:37:28Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-21953"
    },
    {
      "cve": "CVE-2025-21956",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21956"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Assign normalized_pix_clk when color depth = 14\n\n[WHY \u0026 HOW]\nA warning message \"WARNING: CPU: 4 PID: 459 at ... /dc_resource.c:3397\ncalculate_phy_pix_clks+0xef/0x100 [amdgpu]\" occurs because the\ndisplay_color_depth == COLOR_DEPTH_141414 is not handled. This is\nobserved in Radeon RX 6600 XT.\n\nIt is fixed by assigning pix_clk * (14 * 3) / 24 - same as the rests.\n\nAlso fixes the indentation in get_norm_pix_clk.\n\n(cherry picked from commit 274a87eb389f58eddcbc5659ab0b180b37e92775)",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
          "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21956",
          "url": "https://www.suse.com/security/cve/CVE-2025-21956"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1240739 for CVE-2025-21956",
          "url": "https://bugzilla.suse.com/1240739"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 0,
            "baseSeverity": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-25T09:37:28Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-21956"
    },
    {
      "cve": "CVE-2025-21957",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21957"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla1280: Fix kernel oops when debug level \u003e 2\n\nA null dereference or oops exception will eventually occur when qla1280.c\ndriver is compiled with DEBUG_QLA1280 enabled and ql_debug_level \u003e 2.  I\nthink its clear from the code that the intention here is sg_dma_len(s) not\nlength of sg_next(s) when printing the debug info.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
          "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21957",
          "url": "https://www.suse.com/security/cve/CVE-2025-21957"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1240742 for CVE-2025-21957",
          "url": "https://bugzilla.suse.com/1240742"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-25T09:37:28Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-21957"
    },
    {
      "cve": "CVE-2025-21960",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21960"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\neth: bnxt: do not update checksum in bnxt_xdp_build_skb()\n\nThe bnxt_rx_pkt() updates ip_summed value at the end if checksum offload\nis enabled.\nWhen the XDP-MB program is attached and it returns XDP_PASS, the\nbnxt_xdp_build_skb() is called to update skb_shared_info.\nThe main purpose of bnxt_xdp_build_skb() is to update skb_shared_info,\nbut it updates ip_summed value too if checksum offload is enabled.\nThis is actually duplicate work.\n\nWhen the bnxt_rx_pkt() updates ip_summed value, it checks if ip_summed\nis CHECKSUM_NONE or not.\nIt means that ip_summed should be CHECKSUM_NONE at this moment.\nBut ip_summed may already be updated to CHECKSUM_UNNECESSARY in the\nXDP-MB-PASS path.\nSo the by skb_checksum_none_assert() WARNS about it.\n\nThis is duplicate work and updating ip_summed in the\nbnxt_xdp_build_skb() is not needed.\n\nSplat looks like:\nWARNING: CPU: 3 PID: 5782 at ./include/linux/skbuff.h:5155 bnxt_rx_pkt+0x479b/0x7610 [bnxt_en]\nModules linked in: bnxt_re bnxt_en rdma_ucm rdma_cm iw_cm ib_cm ib_uverbs veth xt_nat xt_tcpudp xt_conntrack nft_chain_nat xt_MASQUERADE nf_]\nCPU: 3 UID: 0 PID: 5782 Comm: socat Tainted: G        W          6.14.0-rc4+ #27\nTainted: [W]=WARN\nHardware name: ASUS System Product Name/PRIME Z690-P D4, BIOS 0603 11/01/2021\nRIP: 0010:bnxt_rx_pkt+0x479b/0x7610 [bnxt_en]\nCode: 54 24 0c 4c 89 f1 4c 89 ff c1 ea 1f ff d3 0f 1f 00 49 89 c6 48 85 c0 0f 84 4c e5 ff ff 48 89 c7 e8 ca 3d a0 c8 e9 8f f4 ff ff \u003c0f\u003e 0b f\nRSP: 0018:ffff88881ba09928 EFLAGS: 00010202\nRAX: 0000000000000000 RBX: 00000000c7590303 RCX: 0000000000000000\nRDX: 1ffff1104e7d1610 RSI: 0000000000000001 RDI: ffff8881c91300b8\nRBP: ffff88881ba09b28 R08: ffff888273e8b0d0 R09: ffff888273e8b070\nR10: ffff888273e8b010 R11: ffff888278b0f000 R12: ffff888273e8b080\nR13: ffff8881c9130e00 R14: ffff8881505d3800 R15: ffff888273e8b000\nFS:  00007f5a2e7be080(0000) GS:ffff88881ba00000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007fff2e708ff8 CR3: 000000013e3b0000 CR4: 00000000007506f0\nPKRU: 55555554\nCall Trace:\n \u003cIRQ\u003e\n ? __warn+0xcd/0x2f0\n ? bnxt_rx_pkt+0x479b/0x7610\n ? report_bug+0x326/0x3c0\n ? handle_bug+0x53/0xa0\n ? exc_invalid_op+0x14/0x50\n ? asm_exc_invalid_op+0x16/0x20\n ? bnxt_rx_pkt+0x479b/0x7610\n ? bnxt_rx_pkt+0x3e41/0x7610\n ? __pfx_bnxt_rx_pkt+0x10/0x10\n ? napi_complete_done+0x2cf/0x7d0\n __bnxt_poll_work+0x4e8/0x1220\n ? __pfx___bnxt_poll_work+0x10/0x10\n ? __pfx_mark_lock.part.0+0x10/0x10\n bnxt_poll_p5+0x36a/0xfa0\n ? __pfx_bnxt_poll_p5+0x10/0x10\n __napi_poll.constprop.0+0xa0/0x440\n net_rx_action+0x899/0xd00\n...\n\nFollowing ping.py patch adds xdp-mb-pass case. so ping.py is going\nto be able to reproduce this issue.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
          "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21960",
          "url": "https://www.suse.com/security/cve/CVE-2025-21960"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1240815 for CVE-2025-21960",
          "url": "https://bugzilla.suse.com/1240815"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 0,
            "baseSeverity": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-25T09:37:28Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-21960"
    },
    {
      "cve": "CVE-2025-21961",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21961"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\neth: bnxt: fix truesize for mb-xdp-pass case\n\nWhen mb-xdp is set and return is XDP_PASS, packet is converted from\nxdp_buff to sk_buff with xdp_update_skb_shared_info() in\nbnxt_xdp_build_skb().\nbnxt_xdp_build_skb() passes incorrect truesize argument to\nxdp_update_skb_shared_info().\nThe truesize is calculated as BNXT_RX_PAGE_SIZE * sinfo-\u003enr_frags but\nthe skb_shared_info was wiped by napi_build_skb() before.\nSo it stores sinfo-\u003enr_frags before bnxt_xdp_build_skb() and use it\ninstead of getting skb_shared_info from xdp_get_shared_info_from_buff().\n\nSplat looks like:\n ------------[ cut here ]------------\n WARNING: CPU: 2 PID: 0 at net/core/skbuff.c:6072 skb_try_coalesce+0x504/0x590\n Modules linked in: xt_nat xt_tcpudp veth af_packet xt_conntrack nft_chain_nat xt_MASQUERADE nf_conntrack_netlink xfrm_user xt_addrtype nft_coms\n CPU: 2 UID: 0 PID: 0 Comm: swapper/2 Not tainted 6.14.0-rc2+ #3\n RIP: 0010:skb_try_coalesce+0x504/0x590\n Code: 4b fd ff ff 49 8b 34 24 40 80 e6 40 0f 84 3d fd ff ff 49 8b 74 24 48 40 f6 c6 01 0f 84 2e fd ff ff 48 8d 4e ff e9 25 fd ff ff \u003c0f\u003e 0b e99\n RSP: 0018:ffffb62c4120caa8 EFLAGS: 00010287\n RAX: 0000000000000003 RBX: ffffb62c4120cb14 RCX: 0000000000000ec0\n RDX: 0000000000001000 RSI: ffffa06e5d7dc000 RDI: 0000000000000003\n RBP: ffffa06e5d7ddec0 R08: ffffa06e6120a800 R09: ffffa06e7a119900\n R10: 0000000000002310 R11: ffffa06e5d7dcec0 R12: ffffe4360575f740\n R13: ffffe43600000000 R14: 0000000000000002 R15: 0000000000000002\n FS:  0000000000000000(0000) GS:ffffa0755f700000(0000) knlGS:0000000000000000\n CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 00007f147b76b0f8 CR3: 00000001615d4000 CR4: 00000000007506f0\n PKRU: 55555554\n Call Trace:\n  \u003cIRQ\u003e\n  ? __warn+0x84/0x130\n  ? skb_try_coalesce+0x504/0x590\n  ? report_bug+0x18a/0x1a0\n  ? handle_bug+0x53/0x90\n  ? exc_invalid_op+0x14/0x70\n  ? asm_exc_invalid_op+0x16/0x20\n  ? skb_try_coalesce+0x504/0x590\n  inet_frag_reasm_finish+0x11f/0x2e0\n  ip_defrag+0x37a/0x900\n  ip_local_deliver+0x51/0x120\n  ip_sublist_rcv_finish+0x64/0x70\n  ip_sublist_rcv+0x179/0x210\n  ip_list_rcv+0xf9/0x130\n\nHow to reproduce:\n\u003cNode A\u003e\nip link set $interface1 xdp obj xdp_pass.o\nip link set $interface1 mtu 9000 up\nip a a 10.0.0.1/24 dev $interface1\n\u003cNode B\u003e\nip link set $interfac2 mtu 9000 up\nip a a 10.0.0.2/24 dev $interface2\nping 10.0.0.1 -s 65000\n\nFollowing ping.py patch adds xdp-mb-pass case. so ping.py is going to be\nable to reproduce this issue.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
          "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21961",
          "url": "https://www.suse.com/security/cve/CVE-2025-21961"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1240816 for CVE-2025-21961",
          "url": "https://bugzilla.suse.com/1240816"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-25T09:37:28Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-21961"
    },
    {
      "cve": "CVE-2025-21966",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21966"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm-flakey: Fix memory corruption in optional corrupt_bio_byte feature\n\nFix memory corruption due to incorrect parameter being passed to bio_init",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
          "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21966",
          "url": "https://www.suse.com/security/cve/CVE-2025-21966"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1240779 for CVE-2025-21966",
          "url": "https://bugzilla.suse.com/1240779"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-25T09:37:28Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-21966"
    },
    {
      "cve": "CVE-2025-21968",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21968"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Fix slab-use-after-free on hdcp_work\n\n[Why]\nA slab-use-after-free is reported when HDCP is destroyed but the\nproperty_validate_dwork queue is still running.\n\n[How]\nCancel the delayed work when destroying workqueue.\n\n(cherry picked from commit 725a04ba5a95e89c89633d4322430cfbca7ce128)",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
          "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21968",
          "url": "https://www.suse.com/security/cve/CVE-2025-21968"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1240783 for CVE-2025-21968",
          "url": "https://bugzilla.suse.com/1240783"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-25T09:37:28Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-21968"
    },
    {
      "cve": "CVE-2025-21969",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21969"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: L2CAP: Fix slab-use-after-free Read in l2cap_send_cmd\n\nAfter the hci sync command releases l2cap_conn, the hci receive data work\nqueue references the released l2cap_conn when sending to the upper layer.\nAdd hci dev lock to the hci receive data work queue to synchronize the two.\n\n[1]\nBUG: KASAN: slab-use-after-free in l2cap_send_cmd+0x187/0x8d0 net/bluetooth/l2cap_core.c:954\nRead of size 8 at addr ffff8880271a4000 by task kworker/u9:2/5837\n\nCPU: 0 UID: 0 PID: 5837 Comm: kworker/u9:2 Not tainted 6.13.0-rc5-syzkaller-00163-gab75170520d4 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024\nWorkqueue: hci1 hci_rx_work\nCall Trace:\n \u003cTASK\u003e\n __dump_stack lib/dump_stack.c:94 [inline]\n dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:378 [inline]\n print_report+0x169/0x550 mm/kasan/report.c:489\n kasan_report+0x143/0x180 mm/kasan/report.c:602\n l2cap_build_cmd net/bluetooth/l2cap_core.c:2964 [inline]\n l2cap_send_cmd+0x187/0x8d0 net/bluetooth/l2cap_core.c:954\n l2cap_sig_send_rej net/bluetooth/l2cap_core.c:5502 [inline]\n l2cap_sig_channel net/bluetooth/l2cap_core.c:5538 [inline]\n l2cap_recv_frame+0x221f/0x10db0 net/bluetooth/l2cap_core.c:6817\n hci_acldata_packet net/bluetooth/hci_core.c:3797 [inline]\n hci_rx_work+0x508/0xdb0 net/bluetooth/hci_core.c:4040\n process_one_work kernel/workqueue.c:3229 [inline]\n process_scheduled_works+0xa66/0x1840 kernel/workqueue.c:3310\n worker_thread+0x870/0xd30 kernel/workqueue.c:3391\n kthread+0x2f0/0x390 kernel/kthread.c:389\n ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147\n ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244\n \u003c/TASK\u003e\n\nAllocated by task 5837:\n kasan_save_stack mm/kasan/common.c:47 [inline]\n kasan_save_track+0x3f/0x80 mm/kasan/common.c:68\n poison_kmalloc_redzone mm/kasan/common.c:377 [inline]\n __kasan_kmalloc+0x98/0xb0 mm/kasan/common.c:394\n kasan_kmalloc include/linux/kasan.h:260 [inline]\n __kmalloc_cache_noprof+0x243/0x390 mm/slub.c:4329\n kmalloc_noprof include/linux/slab.h:901 [inline]\n kzalloc_noprof include/linux/slab.h:1037 [inline]\n l2cap_conn_add+0xa9/0x8e0 net/bluetooth/l2cap_core.c:6860\n l2cap_connect_cfm+0x115/0x1090 net/bluetooth/l2cap_core.c:7239\n hci_connect_cfm include/net/bluetooth/hci_core.h:2057 [inline]\n hci_remote_features_evt+0x68e/0xac0 net/bluetooth/hci_event.c:3726\n hci_event_func net/bluetooth/hci_event.c:7473 [inline]\n hci_event_packet+0xac2/0x1540 net/bluetooth/hci_event.c:7525\n hci_rx_work+0x3f3/0xdb0 net/bluetooth/hci_core.c:4035\n process_one_work kernel/workqueue.c:3229 [inline]\n process_scheduled_works+0xa66/0x1840 kernel/workqueue.c:3310\n worker_thread+0x870/0xd30 kernel/workqueue.c:3391\n kthread+0x2f0/0x390 kernel/kthread.c:389\n ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147\n ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244\n\nFreed by task 54:\n kasan_save_stack mm/kasan/common.c:47 [inline]\n kasan_save_track+0x3f/0x80 mm/kasan/common.c:68\n kasan_save_free_info+0x40/0x50 mm/kasan/generic.c:582\n poison_slab_object mm/kasan/common.c:247 [inline]\n __kasan_slab_free+0x59/0x70 mm/kasan/common.c:264\n kasan_slab_free include/linux/kasan.h:233 [inline]\n slab_free_hook mm/slub.c:2353 [inline]\n slab_free mm/slub.c:4613 [inline]\n kfree+0x196/0x430 mm/slub.c:4761\n l2cap_connect_cfm+0xcc/0x1090 net/bluetooth/l2cap_core.c:7235\n hci_connect_cfm include/net/bluetooth/hci_core.h:2057 [inline]\n hci_conn_failed+0x287/0x400 net/bluetooth/hci_conn.c:1266\n hci_abort_conn_sync+0x56c/0x11f0 net/bluetooth/hci_sync.c:5603\n hci_cmd_sync_work+0x22b/0x400 net/bluetooth/hci_sync.c:332\n process_one_work kernel/workqueue.c:3229 [inline]\n process_scheduled_works+0xa66/0x1840 kernel/workqueue.c:3310\n worker_thread+0x870/0xd30 kernel/workqueue.c:3391\n kthread+0x2f0/0x390 kernel/kthread.c:389\n ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147\n ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entr\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
          "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21969",
          "url": "https://www.suse.com/security/cve/CVE-2025-21969"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1240784 for CVE-2025-21969",
          "url": "https://bugzilla.suse.com/1240784"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-25T09:37:28Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-21969"
    },
    {
      "cve": "CVE-2025-21970",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21970"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5: Bridge, fix the crash caused by LAG state check\n\nWhen removing LAG device from bridge, NETDEV_CHANGEUPPER event is\ntriggered. Driver finds the lower devices (PFs) to flush all the\noffloaded entries. And mlx5_lag_is_shared_fdb is checked, it returns\nfalse if one of PF is unloaded. In such case,\nmlx5_esw_bridge_lag_rep_get() and its caller return NULL, instead of\nthe alive PF, and the flush is skipped.\n\nBesides, the bridge fdb entry\u0027s lastuse is updated in mlx5 bridge\nevent handler. But this SWITCHDEV_FDB_ADD_TO_BRIDGE event can be\nignored in this case because the upper interface for bond is deleted,\nand the entry will never be aged because lastuse is never updated.\n\nTo make things worse, as the entry is alive, mlx5 bridge workqueue\nkeeps sending that event, which is then handled by kernel bridge\nnotifier. It causes the following crash when accessing the passed bond\nnetdev which is already destroyed.\n\nTo fix this issue, remove such checks. LAG state is already checked in\ncommit 15f8f168952f (\"net/mlx5: Bridge, verify LAG state when adding\nbond to bridge\"), driver still need to skip offload if LAG becomes\ninvalid state after initialization.\n\n Oops: stack segment: 0000 [#1] SMP\n CPU: 3 UID: 0 PID: 23695 Comm: kworker/u40:3 Tainted: G           OE      6.11.0_mlnx #1\n Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE\n Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014\n Workqueue: mlx5_bridge_wq mlx5_esw_bridge_update_work [mlx5_core]\n RIP: 0010:br_switchdev_event+0x2c/0x110 [bridge]\n Code: 44 00 00 48 8b 02 48 f7 00 00 02 00 00 74 69 41 54 55 53 48 83 ec 08 48 8b a8 08 01 00 00 48 85 ed 74 4a 48 83 fe 02 48 89 d3 \u003c4c\u003e 8b 65 00 74 23 76 49 48 83 fe 05 74 7e 48 83 fe 06 75 2f 0f b7\n RSP: 0018:ffffc900092cfda0 EFLAGS: 00010297\n RAX: ffff888123bfe000 RBX: ffffc900092cfe08 RCX: 00000000ffffffff\n RDX: ffffc900092cfe08 RSI: 0000000000000001 RDI: ffffffffa0c585f0\n RBP: 6669746f6e690a30 R08: 0000000000000000 R09: ffff888123ae92c8\n R10: 0000000000000000 R11: fefefefefefefeff R12: ffff888123ae9c60\n R13: 0000000000000001 R14: ffffc900092cfe08 R15: 0000000000000000\n FS:  0000000000000000(0000) GS:ffff88852c980000(0000) knlGS:0000000000000000\n CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 00007f15914c8734 CR3: 0000000002830005 CR4: 0000000000770ef0\n DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n PKRU: 55555554\n Call Trace:\n  \u003cTASK\u003e\n  ? __die_body+0x1a/0x60\n  ? die+0x38/0x60\n  ? do_trap+0x10b/0x120\n  ? do_error_trap+0x64/0xa0\n  ? exc_stack_segment+0x33/0x50\n  ? asm_exc_stack_segment+0x22/0x30\n  ? br_switchdev_event+0x2c/0x110 [bridge]\n  ? sched_balance_newidle.isra.149+0x248/0x390\n  notifier_call_chain+0x4b/0xa0\n  atomic_notifier_call_chain+0x16/0x20\n  mlx5_esw_bridge_update+0xec/0x170 [mlx5_core]\n  mlx5_esw_bridge_update_work+0x19/0x40 [mlx5_core]\n  process_scheduled_works+0x81/0x390\n  worker_thread+0x106/0x250\n  ? bh_worker+0x110/0x110\n  kthread+0xb7/0xe0\n  ? kthread_park+0x80/0x80\n  ret_from_fork+0x2d/0x50\n  ? kthread_park+0x80/0x80\n  ret_from_fork_asm+0x11/0x20\n  \u003c/TASK\u003e",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
          "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21970",
          "url": "https://www.suse.com/security/cve/CVE-2025-21970"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1240819 for CVE-2025-21970",
          "url": "https://bugzilla.suse.com/1240819"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-25T09:37:28Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-21970"
    },
    {
      "cve": "CVE-2025-21971",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21971"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet_sched: Prevent creation of classes with TC_H_ROOT\n\nThe function qdisc_tree_reduce_backlog() uses TC_H_ROOT as a termination\ncondition when traversing up the qdisc tree to update parent backlog\ncounters. However, if a class is created with classid TC_H_ROOT, the\ntraversal terminates prematurely at this class instead of reaching the\nactual root qdisc, causing parent statistics to be incorrectly maintained.\nIn case of DRR, this could lead to a crash as reported by Mingi Cho.\n\nPrevent the creation of any Qdisc class with classid TC_H_ROOT\n(0xFFFFFFFF) across all qdisc types, as suggested by Jamal.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
          "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21971",
          "url": "https://www.suse.com/security/cve/CVE-2025-21971"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1240799 for CVE-2025-21971",
          "url": "https://bugzilla.suse.com/1240799"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245794 for CVE-2025-21971",
          "url": "https://bugzilla.suse.com/1245794"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-25T09:37:28Z",
          "details": "important"
        }
      ],
      "title": "CVE-2025-21971"
    },
    {
      "cve": "CVE-2025-21972",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21972"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: mctp: unshare packets when reassembling\n\nEnsure that the frag_list used for reassembly isn\u0027t shared with other\npackets. This avoids incorrect reassembly when packets are cloned, and\nprevents a memory leak due to circular references between fragments and\ntheir skb_shared_info.\n\nThe upcoming MCTP-over-USB driver uses skb_clone which can trigger the\nproblem - other MCTP drivers don\u0027t share SKBs.\n\nA kunit test is added to reproduce the issue.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
          "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21972",
          "url": "https://www.suse.com/security/cve/CVE-2025-21972"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1240813 for CVE-2025-21972",
          "url": "https://bugzilla.suse.com/1240813"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-25T09:37:28Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-21972"
    },
    {
      "cve": "CVE-2025-21975",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21975"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5: handle errors in mlx5_chains_create_table()\n\nIn mlx5_chains_create_table(), the return value of  mlx5_get_fdb_sub_ns()\nand mlx5_get_flow_namespace() must be checked to prevent NULL pointer\ndereferences. If either function fails, the function should log error\nmessage with mlx5_core_warn() and return error pointer.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
          "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21975",
          "url": "https://www.suse.com/security/cve/CVE-2025-21975"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1240812 for CVE-2025-21975",
          "url": "https://bugzilla.suse.com/1240812"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-25T09:37:28Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-21975"
    },
    {
      "cve": "CVE-2025-21978",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21978"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/hyperv: Fix address space leak when Hyper-V DRM device is removed\n\nWhen a Hyper-V DRM device is probed, the driver allocates MMIO space for\nthe vram, and maps it cacheable. If the device removed, or in the error\npath for device probing, the MMIO space is released but no unmap is done.\nConsequently the kernel address space for the mapping is leaked.\n\nFix this by adding iounmap() calls in the device removal path, and in the\nerror path during device probing.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
          "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21978",
          "url": "https://www.suse.com/security/cve/CVE-2025-21978"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1240806 for CVE-2025-21978",
          "url": "https://bugzilla.suse.com/1240806"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-25T09:37:28Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-21978"
    },
    {
      "cve": "CVE-2025-21979",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21979"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: cfg80211: cancel wiphy_work before freeing wiphy\n\nA wiphy_work can be queued from the moment the wiphy is allocated and\ninitialized (i.e. wiphy_new_nm). When a wiphy_work is queued, the\nrdev::wiphy_work is getting queued.\n\nIf wiphy_free is called before the rdev::wiphy_work had a chance to run,\nthe wiphy memory will be freed, and then when it eventally gets to run\nit\u0027ll use invalid memory.\n\nFix this by canceling the work before freeing the wiphy.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
          "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21979",
          "url": "https://www.suse.com/security/cve/CVE-2025-21979"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1240808 for CVE-2025-21979",
          "url": "https://bugzilla.suse.com/1240808"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-25T09:37:28Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-21979"
    },
    {
      "cve": "CVE-2025-21981",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21981"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nice: fix memory leak in aRFS after reset\n\nFix aRFS (accelerated Receive Flow Steering) structures memory leak by\nadding a checker to verify if aRFS memory is already allocated while\nconfiguring VSI. aRFS objects are allocated in two cases:\n- as part of VSI initialization (at probe), and\n- as part of reset handling\n\nHowever, VSI reconfiguration executed during reset involves memory\nallocation one more time, without prior releasing already allocated\nresources. This led to the memory leak with the following signature:\n\n[root@os-delivery ~]# cat /sys/kernel/debug/kmemleak\nunreferenced object 0xff3c1ca7252e6000 (size 8192):\n  comm \"kworker/0:0\", pid 8, jiffies 4296833052\n  hex dump (first 32 bytes):\n    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................\n    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................\n  backtrace (crc 0):\n    [\u003cffffffff991ec485\u003e] __kmalloc_cache_noprof+0x275/0x340\n    [\u003cffffffffc0a6e06a\u003e] ice_init_arfs+0x3a/0xe0 [ice]\n    [\u003cffffffffc09f1027\u003e] ice_vsi_cfg_def+0x607/0x850 [ice]\n    [\u003cffffffffc09f244b\u003e] ice_vsi_setup+0x5b/0x130 [ice]\n    [\u003cffffffffc09c2131\u003e] ice_init+0x1c1/0x460 [ice]\n    [\u003cffffffffc09c64af\u003e] ice_probe+0x2af/0x520 [ice]\n    [\u003cffffffff994fbcd3\u003e] local_pci_probe+0x43/0xa0\n    [\u003cffffffff98f07103\u003e] work_for_cpu_fn+0x13/0x20\n    [\u003cffffffff98f0b6d9\u003e] process_one_work+0x179/0x390\n    [\u003cffffffff98f0c1e9\u003e] worker_thread+0x239/0x340\n    [\u003cffffffff98f14abc\u003e] kthread+0xcc/0x100\n    [\u003cffffffff98e45a6d\u003e] ret_from_fork+0x2d/0x50\n    [\u003cffffffff98e083ba\u003e] ret_from_fork_asm+0x1a/0x30\n    ...",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
          "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21981",
          "url": "https://www.suse.com/security/cve/CVE-2025-21981"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1240612 for CVE-2025-21981",
          "url": "https://bugzilla.suse.com/1240612"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-25T09:37:28Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-21981"
    },
    {
      "cve": "CVE-2025-21991",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21991"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/microcode/AMD: Fix out-of-bounds on systems with CPU-less NUMA nodes\n\nCurrently, load_microcode_amd() iterates over all NUMA nodes, retrieves their\nCPU masks and unconditionally accesses per-CPU data for the first CPU of each\nmask.\n\nAccording to Documentation/admin-guide/mm/numaperf.rst:\n\n  \"Some memory may share the same node as a CPU, and others are provided as\n  memory only nodes.\"\n\nTherefore, some node CPU masks may be empty and wouldn\u0027t have a \"first CPU\".\n\nOn a machine with far memory (and therefore CPU-less NUMA nodes):\n- cpumask_of_node(nid) is 0\n- cpumask_first(0) is CONFIG_NR_CPUS\n- cpu_data(CONFIG_NR_CPUS) accesses the cpu_info per-CPU array at an\n  index that is 1 out of bounds\n\nThis does not have any security implications since flashing microcode is\na privileged operation but I believe this has reliability implications by\npotentially corrupting memory while flashing a microcode update.\n\nWhen booting with CONFIG_UBSAN_BOUNDS=y on an AMD machine that flashes\na microcode update. I get the following splat:\n\n  UBSAN: array-index-out-of-bounds in arch/x86/kernel/cpu/microcode/amd.c:X:Y\n  index 512 is out of range for type \u0027unsigned long[512]\u0027\n  [...]\n  Call Trace:\n   dump_stack\n   __ubsan_handle_out_of_bounds\n   load_microcode_amd\n   request_microcode_amd\n   reload_store\n   kernfs_fop_write_iter\n   vfs_write\n   ksys_write\n   do_syscall_64\n   entry_SYSCALL_64_after_hwframe\n\nChange the loop to go over only NUMA nodes which have CPUs before determining\nwhether the first CPU on the respective node needs microcode update.\n\n  [ bp: Massage commit message, fix typo. ]",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
          "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21991",
          "url": "https://www.suse.com/security/cve/CVE-2025-21991"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1240795 for CVE-2025-21991",
          "url": "https://bugzilla.suse.com/1240795"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-25T09:37:28Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-21991"
    },
    {
      "cve": "CVE-2025-21992",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21992"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: ignore non-functional sensor in HP 5MP Camera\n\nThe HP 5MP Camera (USB ID 0408:5473) reports a HID sensor interface that\nis not actually implemented. Attempting to access this non-functional\nsensor via iio_info causes system hangs as runtime PM tries to wake up\nan unresponsive sensor.\n\n  [453] hid-sensor-hub 0003:0408:5473.0003: Report latency attributes: ffffffff:ffffffff\n  [453] hid-sensor-hub 0003:0408:5473.0003: common attributes: 5:1, 2:1, 3:1 ffffffff:ffffffff\n\nAdd this device to the HID ignore list since the sensor interface is\nnon-functional by design and should not be exposed to userspace.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
          "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21992",
          "url": "https://www.suse.com/security/cve/CVE-2025-21992"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1240796 for CVE-2025-21992",
          "url": "https://bugzilla.suse.com/1240796"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-25T09:37:28Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-21992"
    },
    {
      "cve": "CVE-2025-21993",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21993"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\niscsi_ibft: Fix UBSAN shift-out-of-bounds warning in ibft_attr_show_nic()\n\nWhen performing an iSCSI boot using IPv6, iscsistart still reads the\n/sys/firmware/ibft/ethernetX/subnet-mask entry. Since the IPv6 prefix\nlength is 64, this causes the shift exponent to become negative,\ntriggering a UBSAN warning. As the concept of a subnet mask does not\napply to IPv6, the value is set to ~0 to suppress the warning message.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
          "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21993",
          "url": "https://www.suse.com/security/cve/CVE-2025-21993"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1240797 for CVE-2025-21993",
          "url": "https://bugzilla.suse.com/1240797"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-25T09:37:28Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-21993"
    },
    {
      "cve": "CVE-2025-21995",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21995"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/sched: Fix fence reference count leak\n\nThe last_scheduled fence leaks when an entity is being killed and adding\nthe cleanup callback fails.\n\nDecrement the reference count of prev when dma_fence_add_callback()\nfails, ensuring proper balance.\n\n[phasta: add git tag info for stable kernel]",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
          "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21995",
          "url": "https://www.suse.com/security/cve/CVE-2025-21995"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1240821 for CVE-2025-21995",
          "url": "https://bugzilla.suse.com/1240821"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-25T09:37:28Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-21995"
    },
    {
      "cve": "CVE-2025-21996",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21996"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/radeon: fix uninitialized size issue in radeon_vce_cs_parse()\n\nOn the off chance that command stream passed from userspace via\nioctl() call to radeon_vce_cs_parse() is weirdly crafted and\nfirst command to execute is to encode (case 0x03000001), the function\nin question will attempt to call radeon_vce_cs_reloc() with size\nargument that has not been properly initialized. Specifically, \u0027size\u0027\nwill point to \u0027tmp\u0027 variable before the latter had a chance to be\nassigned any value.\n\nPlay it safe and init \u0027tmp\u0027 with 0, thus ensuring that\nradeon_vce_cs_reloc() will catch an early error in cases like these.\n\nFound by Linux Verification Center (linuxtesting.org) with static\nanalysis tool SVACE.\n\n(cherry picked from commit 2d52de55f9ee7aaee0e09ac443f77855989c6b68)",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
          "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21996",
          "url": "https://www.suse.com/security/cve/CVE-2025-21996"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1240801 for CVE-2025-21996",
          "url": "https://bugzilla.suse.com/1240801"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-25T09:37:28Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-21996"
    },
    {
      "cve": "CVE-2025-22001",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-22001"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\naccel/qaic: Fix integer overflow in qaic_validate_req()\n\nThese are u64 variables that come from the user via\nqaic_attach_slice_bo_ioctl().  Use check_add_overflow() to ensure that\nthe math doesn\u0027t have an integer wrapping bug.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
          "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-22001",
          "url": "https://www.suse.com/security/cve/CVE-2025-22001"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1240873 for CVE-2025-22001",
          "url": "https://bugzilla.suse.com/1240873"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-25T09:37:28Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-22001"
    },
    {
      "cve": "CVE-2025-22003",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-22003"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: ucan: fix out of bound read in strscpy() source\n\nCommit 7fdaf8966aae (\"can: ucan: use strscpy() to instead of strncpy()\")\nunintentionally introduced a one byte out of bound read on strscpy()\u0027s\nsource argument (which is kind of ironic knowing that strscpy() is meant\nto be a more secure alternative :)).\n\nLet\u0027s consider below buffers:\n\n  dest[len + 1]; /* will be NUL terminated */\n  src[len]; /* may not be NUL terminated */\n\nWhen doing:\n\n  strncpy(dest, src, len);\n  dest[len] = \u0027\\0\u0027;\n\nstrncpy() will read up to len bytes from src.\n\nOn the other hand:\n\n  strscpy(dest, src, len + 1);\n\nwill read up to len + 1 bytes from src, that is to say, an out of bound\nread of one byte will occur on src if it is not NUL terminated. Note\nthat the src[len] byte is never copied, but strscpy() still needs to\nread it to check whether a truncation occurred or not.\n\nThis exact pattern happened in ucan.\n\nThe root cause is that the source is not NUL terminated. Instead of\ndoing a copy in a local buffer, directly NUL terminate it as soon as\nusb_control_msg() returns. With this, the local firmware_str[] variable\ncan be removed.\n\nOn top of this do a couple refactors:\n\n  - ucan_ctl_payload-\u003eraw is only used for the firmware string, so\n    rename it to ucan_ctl_payload-\u003efw_str and change its type from u8 to\n    char.\n\n  - ucan_device_request_in() is only used to retrieve the firmware\n    string, so rename it to ucan_get_fw_str() and refactor it to make it\n    directly handle all the string termination logic.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
          "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-22003",
          "url": "https://www.suse.com/security/cve/CVE-2025-22003"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1240825 for CVE-2025-22003",
          "url": "https://bugzilla.suse.com/1240825"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-25T09:37:28Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-22003"
    },
    {
      "cve": "CVE-2025-22007",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-22007"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: Fix error code in chan_alloc_skb_cb()\n\nThe chan_alloc_skb_cb() function is supposed to return error pointers on\nerror.  Returning NULL will lead to a NULL dereference.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
          "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-22007",
          "url": "https://www.suse.com/security/cve/CVE-2025-22007"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1240829 for CVE-2025-22007",
          "url": "https://bugzilla.suse.com/1240829"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-25T09:37:28Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-22007"
    },
    {
      "cve": "CVE-2025-22008",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-22008"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nregulator: check that dummy regulator has been probed before using it\n\nDue to asynchronous driver probing there is a chance that the dummy\nregulator hasn\u0027t already been probed when first accessing it.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
          "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-22008",
          "url": "https://www.suse.com/security/cve/CVE-2025-22008"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1240942 for CVE-2025-22008",
          "url": "https://bugzilla.suse.com/1240942"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-25T09:37:28Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-22008"
    },
    {
      "cve": "CVE-2025-22009",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-22009"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nregulator: dummy: force synchronous probing\n\nSometimes I get a NULL pointer dereference at boot time in kobject_get()\nwith the following call stack:\n\nanatop_regulator_probe()\n devm_regulator_register()\n  regulator_register()\n   regulator_resolve_supply()\n    kobject_get()\n\nBy placing some extra BUG_ON() statements I could verify that this is\nraised because probing of the \u0027dummy\u0027 regulator driver is not completed\n(\u0027dummy_regulator_rdev\u0027 is still NULL).\n\nIn the JTAG debugger I can see that dummy_regulator_probe() and\nanatop_regulator_probe() can be run by different kernel threads\n(kworker/u4:*).  I haven\u0027t further investigated whether this can be\nchanged or if there are other possibilities to force synchronization\nbetween these two probe routines.  On the other hand I don\u0027t expect much\nboot time penalty by probing the \u0027dummy\u0027 regulator synchronously.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
          "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-22009",
          "url": "https://www.suse.com/security/cve/CVE-2025-22009"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1240940 for CVE-2025-22009",
          "url": "https://bugzilla.suse.com/1240940"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-25T09:37:28Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-22009"
    },
    {
      "cve": "CVE-2025-22010",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-22010"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/hns: Fix soft lockup during bt pages loop\n\nDriver runs a for-loop when allocating bt pages and mapping them with\nbuffer pages. When a large buffer (e.g. MR over 100GB) is being allocated,\nit may require a considerable loop count. This will lead to soft lockup:\n\n        watchdog: BUG: soft lockup - CPU#27 stuck for 22s!\n        ...\n        Call trace:\n         hem_list_alloc_mid_bt+0x124/0x394 [hns_roce_hw_v2]\n         hns_roce_hem_list_request+0xf8/0x160 [hns_roce_hw_v2]\n         hns_roce_mtr_create+0x2e4/0x360 [hns_roce_hw_v2]\n         alloc_mr_pbl+0xd4/0x17c [hns_roce_hw_v2]\n         hns_roce_reg_user_mr+0xf8/0x190 [hns_roce_hw_v2]\n         ib_uverbs_reg_mr+0x118/0x290\n\n        watchdog: BUG: soft lockup - CPU#35 stuck for 23s!\n        ...\n        Call trace:\n         hns_roce_hem_list_find_mtt+0x7c/0xb0 [hns_roce_hw_v2]\n         mtr_map_bufs+0xc4/0x204 [hns_roce_hw_v2]\n         hns_roce_mtr_create+0x31c/0x3c4 [hns_roce_hw_v2]\n         alloc_mr_pbl+0xb0/0x160 [hns_roce_hw_v2]\n         hns_roce_reg_user_mr+0x108/0x1c0 [hns_roce_hw_v2]\n         ib_uverbs_reg_mr+0x120/0x2bc\n\nAdd a cond_resched() to fix soft lockup during these loops. In order not\nto affect the allocation performance of normal-size buffer, set the loop\ncount of a 100GB MR as the threshold to call cond_resched().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
          "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-22010",
          "url": "https://www.suse.com/security/cve/CVE-2025-22010"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1240943 for CVE-2025-22010",
          "url": "https://bugzilla.suse.com/1240943"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-25T09:37:28Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-22010"
    },
    {
      "cve": "CVE-2025-22013",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-22013"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: arm64: Unconditionally save+flush host FPSIMD/SVE/SME state\n\nThere are several problems with the way hyp code lazily saves the host\u0027s\nFPSIMD/SVE state, including:\n\n* Host SVE being discarded unexpectedly due to inconsistent\n  configuration of TIF_SVE and CPACR_ELx.ZEN. This has been seen to\n  result in QEMU crashes where SVE is used by memmove(), as reported by\n  Eric Auger:\n\n  https://issues.redhat.com/browse/RHEL-68997\n\n* Host SVE state is discarded *after* modification by ptrace, which was an\n  unintentional ptrace ABI change introduced with lazy discarding of SVE state.\n\n* The host FPMR value can be discarded when running a non-protected VM,\n  where FPMR support is not exposed to a VM, and that VM uses\n  FPSIMD/SVE. In these cases the hyp code does not save the host\u0027s FPMR\n  before unbinding the host\u0027s FPSIMD/SVE/SME state, leaving a stale\n  value in memory.\n\nAvoid these by eagerly saving and \"flushing\" the host\u0027s FPSIMD/SVE/SME\nstate when loading a vCPU such that KVM does not need to save any of the\nhost\u0027s FPSIMD/SVE/SME state. For clarity, fpsimd_kvm_prepare() is\nremoved and the necessary call to fpsimd_save_and_flush_cpu_state() is\nplaced in kvm_arch_vcpu_load_fp(). As \u0027fpsimd_state\u0027 and \u0027fpmr_ptr\u0027\nshould not be used, they are set to NULL; all uses of these will be\nremoved in subsequent patches.\n\nHistorical problems go back at least as far as v5.17, e.g. erroneous\nassumptions about TIF_SVE being clear in commit:\n\n  8383741ab2e773a9 (\"KVM: arm64: Get rid of host SVE tracking/saving\")\n\n... and so this eager save+flush probably needs to be backported to ALL\nstable trees.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
          "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-22013",
          "url": "https://www.suse.com/security/cve/CVE-2025-22013"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1240938 for CVE-2025-22013",
          "url": "https://bugzilla.suse.com/1240938"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-25T09:37:28Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-22013"
    },
    {
      "cve": "CVE-2025-22014",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-22014"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsoc: qcom: pdr: Fix the potential deadlock\n\nWhen some client process A call pdr_add_lookup() to add the look up for\nthe service and does schedule locator work, later a process B got a new\nserver packet indicating locator is up and call pdr_locator_new_server()\nwhich eventually sets pdr-\u003elocator_init_complete to true which process A\nsees and takes list lock and queries domain list but it will timeout due\nto deadlock as the response will queued to the same qmi-\u003ewq and it is\nordered workqueue and process B is not able to complete new server\nrequest work due to deadlock on list lock.\n\nFix it by removing the unnecessary list iteration as the list iteration\nis already being done inside locator work, so avoid it here and just\ncall schedule_work() here.\n\n       Process A                        Process B\n\n                                     process_scheduled_works()\npdr_add_lookup()                      qmi_data_ready_work()\n process_scheduled_works()             pdr_locator_new_server()\n                                         pdr-\u003elocator_init_complete=true;\n   pdr_locator_work()\n    mutex_lock(\u0026pdr-\u003elist_lock);\n\n     pdr_locate_service()                  mutex_lock(\u0026pdr-\u003elist_lock);\n\n      pdr_get_domain_list()\n       pr_err(\"PDR: %s get domain list\n               txn wait failed: %d\\n\",\n               req-\u003eservice_name,\n               ret);\n\nTimeout error log due to deadlock:\n\n\"\n PDR: tms/servreg get domain list txn wait failed: -110\n PDR: service lookup for msm/adsp/sensor_pd:tms/servreg failed: -110\n\"\n\nThanks to Bjorn and Johan for letting me know that this commit also fixes\nan audio regression when using the in-kernel pd-mapper as that makes it\neasier to hit this race. [1]",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
          "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-22014",
          "url": "https://www.suse.com/security/cve/CVE-2025-22014"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1240937 for CVE-2025-22014",
          "url": "https://bugzilla.suse.com/1240937"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-25T09:37:28Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-22014"
    },
    {
      "cve": "CVE-2025-2312",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-2312"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in cifs-utils. When trying to obtain Kerberos credentials, the cifs.upcall program from the cifs-utils package makes an upcall to the wrong namespace in containerized environments. This issue may lead to disclosing sensitive data from the host\u0027s Kerberos credentials cache.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
          "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
          "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-2312",
          "url": "https://www.suse.com/security/cve/CVE-2025-2312"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1239680 for CVE-2025-2312",
          "url": "https://bugzilla.suse.com/1239680"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-30.1.noarch",
            "SUSE Linux Micro 6.0:kernel-livepatch-6_4_0-30-rt-1-1.3.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-30.1.x86_64",
            "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-30.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-25T09:37:28Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-2312"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…