suse-su-2025:20397-1
Vulnerability from csaf_suse
Published
2025-06-10 13:19
Modified
2025-06-10 13:19
Summary
Security update for kernel-livepatch-MICRO-6-0_Update_2
Notes
Title of the patch
Security update for kernel-livepatch-MICRO-6-0_Update_2
Description of the patch
This update for kernel-livepatch-MICRO-6-0_Update_2 fixes the following issues:
- CVE-2024-49855: nbd: fix race between timeout and normal completion (bsc#1232900)
- CVE-2025-21680: pktgen: avoid out-of-bounds access in get_imix_entries (bsc#1236701)
- CVE-2024-58013: Bluetooth: MGMT: Fix slab-use-after-free Read in mgmt_remove_adv_monitor_sync (bsc#1239096)
- CVE-2024-57996: net_sched: sch_sfq: don't allow 1 packet limit References: (bsc#1239077)
Patchnames
SUSE-SLE-Micro-6.1-kernel-35
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for kernel-livepatch-MICRO-6-0_Update_2", "title": "Title of the patch" }, { "category": "description", "text": "This update for kernel-livepatch-MICRO-6-0_Update_2 fixes the following issues:\n\n\n- CVE-2024-49855: nbd: fix race between timeout and normal completion (bsc#1232900)\n- CVE-2025-21680: pktgen: avoid out-of-bounds access in get_imix_entries (bsc#1236701)\n- CVE-2024-58013: Bluetooth: MGMT: Fix slab-use-after-free Read in mgmt_remove_adv_monitor_sync (bsc#1239096)\n- CVE-2024-57996: net_sched: sch_sfq: don\u0027t allow 1 packet limit References: (bsc#1239077)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Micro-6.1-kernel-35", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_20397-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2025:20397-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202520397-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2025:20397-1", "url": "https://lists.suse.com/pipermail/sle-updates/2025-June/040302.html" }, { "category": "self", "summary": "SUSE Bug 1232900", "url": "https://bugzilla.suse.com/1232900" }, { "category": "self", "summary": "SUSE Bug 1236701", "url": "https://bugzilla.suse.com/1236701" }, { "category": "self", "summary": "SUSE Bug 1239077", "url": "https://bugzilla.suse.com/1239077" }, { "category": "self", "summary": "SUSE Bug 1239096", "url": "https://bugzilla.suse.com/1239096" }, { "category": "self", "summary": "SUSE CVE CVE-2024-49855 page", "url": "https://www.suse.com/security/cve/CVE-2024-49855/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-57996 page", "url": "https://www.suse.com/security/cve/CVE-2024-57996/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-58013 page", "url": "https://www.suse.com/security/cve/CVE-2024-58013/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-21680 page", "url": "https://www.suse.com/security/cve/CVE-2025-21680/" } ], "title": "Security update for kernel-livepatch-MICRO-6-0_Update_2", "tracking": { "current_release_date": "2025-06-10T13:19:24Z", "generator": { "date": "2025-06-10T13:19:24Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2025:20397-1", "initial_release_date": "2025-06-10T13:19:24Z", "revision_history": [ { "date": "2025-06-10T13:19:24Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-livepatch-6_4_0-19-default-6-1.1.s390x", "product": { "name": "kernel-livepatch-6_4_0-19-default-6-1.1.s390x", "product_id": "kernel-livepatch-6_4_0-19-default-6-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-livepatch-6_4_0-19-default-6-1.1.x86_64", "product": { "name": "kernel-livepatch-6_4_0-19-default-6-1.1.x86_64", "product_id": "kernel-livepatch-6_4_0-19-default-6-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Micro 6.1", "product": { "name": "SUSE Linux Micro 6.1", "product_id": "SUSE Linux Micro 6.1", "product_identification_helper": { "cpe": "cpe:/o:suse:sl-micro:6.1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-6_4_0-19-default-6-1.1.s390x as component of SUSE Linux Micro 6.1", "product_id": "SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-6-1.1.s390x" }, "product_reference": "kernel-livepatch-6_4_0-19-default-6-1.1.s390x", "relates_to_product_reference": "SUSE Linux Micro 6.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-6_4_0-19-default-6-1.1.x86_64 as component of SUSE Linux Micro 6.1", "product_id": "SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-6-1.1.x86_64" }, "product_reference": "kernel-livepatch-6_4_0-19-default-6-1.1.x86_64", "relates_to_product_reference": "SUSE Linux Micro 6.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-49855", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-49855" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnbd: fix race between timeout and normal completion\n\nIf request timetout is handled by nbd_requeue_cmd(), normal completion\nhas to be stopped for avoiding to complete this requeued request, other\nuse-after-free can be triggered.\n\nFix the race by clearing NBD_CMD_INFLIGHT in nbd_requeue_cmd(), meantime\nmake sure that cmd-\u003elock is grabbed for clearing the flag and the\nrequeue.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-6-1.1.s390x", "SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-6-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-49855", "url": "https://www.suse.com/security/cve/CVE-2024-49855" }, { "category": "external", "summary": "SUSE Bug 1232195 for CVE-2024-49855", "url": "https://bugzilla.suse.com/1232195" }, { "category": "external", "summary": "SUSE Bug 1232900 for CVE-2024-49855", "url": "https://bugzilla.suse.com/1232900" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-6-1.1.s390x", "SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-6-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-6-1.1.s390x", "SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-6-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-06-10T13:19:24Z", "details": "important" } ], "title": "CVE-2024-49855" }, { "cve": "CVE-2024-57996", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-57996" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet_sched: sch_sfq: don\u0027t allow 1 packet limit\n\nThe current implementation does not work correctly with a limit of\n1. iproute2 actually checks for this and this patch adds the check in\nkernel as well.\n\nThis fixes the following syzkaller reported crash:\n\nUBSAN: array-index-out-of-bounds in net/sched/sch_sfq.c:210:6\nindex 65535 is out of range for type \u0027struct sfq_head[128]\u0027\nCPU: 0 PID: 2569 Comm: syz-executor101 Not tainted 5.10.0-smp-DEV #1\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024\nCall Trace:\n __dump_stack lib/dump_stack.c:79 [inline]\n dump_stack+0x125/0x19f lib/dump_stack.c:120\n ubsan_epilogue lib/ubsan.c:148 [inline]\n __ubsan_handle_out_of_bounds+0xed/0x120 lib/ubsan.c:347\n sfq_link net/sched/sch_sfq.c:210 [inline]\n sfq_dec+0x528/0x600 net/sched/sch_sfq.c:238\n sfq_dequeue+0x39b/0x9d0 net/sched/sch_sfq.c:500\n sfq_reset+0x13/0x50 net/sched/sch_sfq.c:525\n qdisc_reset+0xfe/0x510 net/sched/sch_generic.c:1026\n tbf_reset+0x3d/0x100 net/sched/sch_tbf.c:319\n qdisc_reset+0xfe/0x510 net/sched/sch_generic.c:1026\n dev_reset_queue+0x8c/0x140 net/sched/sch_generic.c:1296\n netdev_for_each_tx_queue include/linux/netdevice.h:2350 [inline]\n dev_deactivate_many+0x6dc/0xc20 net/sched/sch_generic.c:1362\n __dev_close_many+0x214/0x350 net/core/dev.c:1468\n dev_close_many+0x207/0x510 net/core/dev.c:1506\n unregister_netdevice_many+0x40f/0x16b0 net/core/dev.c:10738\n unregister_netdevice_queue+0x2be/0x310 net/core/dev.c:10695\n unregister_netdevice include/linux/netdevice.h:2893 [inline]\n __tun_detach+0x6b6/0x1600 drivers/net/tun.c:689\n tun_detach drivers/net/tun.c:705 [inline]\n tun_chr_close+0x104/0x1b0 drivers/net/tun.c:3640\n __fput+0x203/0x840 fs/file_table.c:280\n task_work_run+0x129/0x1b0 kernel/task_work.c:185\n exit_task_work include/linux/task_work.h:33 [inline]\n do_exit+0x5ce/0x2200 kernel/exit.c:931\n do_group_exit+0x144/0x310 kernel/exit.c:1046\n __do_sys_exit_group kernel/exit.c:1057 [inline]\n __se_sys_exit_group kernel/exit.c:1055 [inline]\n __x64_sys_exit_group+0x3b/0x40 kernel/exit.c:1055\n do_syscall_64+0x6c/0xd0\n entry_SYSCALL_64_after_hwframe+0x61/0xcb\nRIP: 0033:0x7fe5e7b52479\nCode: Unable to access opcode bytes at RIP 0x7fe5e7b5244f.\nRSP: 002b:00007ffd3c800398 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7\nRAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fe5e7b52479\nRDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000000\nRBP: 00007fe5e7bcd2d0 R08: ffffffffffffffb8 R09: 0000000000000014\nR10: 0000000000000000 R11: 0000000000000246 R12: 00007fe5e7bcd2d0\nR13: 0000000000000000 R14: 00007fe5e7bcdd20 R15: 00007fe5e7b24270\n\nThe crash can be also be reproduced with the following (with a tc\nrecompiled to allow for sfq limits of 1):\n\ntc qdisc add dev dummy0 handle 1: root tbf rate 1Kbit burst 100b lat 1s\n../iproute2-6.9.0/tc/tc qdisc add dev dummy0 handle 2: parent 1:10 sfq limit 1\nifconfig dummy0 up\nping -I dummy0 -f -c2 -W0.1 8.8.8.8\nsleep 1\n\nScenario that triggers the crash:\n\n* the first packet is sent and queued in TBF and SFQ; qdisc qlen is 1\n\n* TBF dequeues: it peeks from SFQ which moves the packet to the\n gso_skb list and keeps qdisc qlen set to 1. TBF is out of tokens so\n it schedules itself for later.\n\n* the second packet is sent and TBF tries to queues it to SFQ. qdisc\n qlen is now 2 and because the SFQ limit is 1 the packet is dropped\n by SFQ. At this point qlen is 1, and all of the SFQ slots are empty,\n however q-\u003etail is not NULL.\n\nAt this point, assuming no more packets are queued, when sch_dequeue\nruns again it will decrement the qlen for the current empty slot\ncausing an underflow and the subsequent out of bounds access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-6-1.1.s390x", "SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-6-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-57996", "url": "https://www.suse.com/security/cve/CVE-2024-57996" }, { "category": "external", "summary": "SUSE Bug 1239076 for CVE-2024-57996", "url": "https://bugzilla.suse.com/1239076" }, { "category": "external", "summary": "SUSE Bug 1239077 for CVE-2024-57996", "url": "https://bugzilla.suse.com/1239077" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-6-1.1.s390x", "SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-6-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-6-1.1.s390x", "SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-6-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-06-10T13:19:24Z", "details": "important" } ], "title": "CVE-2024-57996" }, { "cve": "CVE-2024-58013", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-58013" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: MGMT: Fix slab-use-after-free Read in mgmt_remove_adv_monitor_sync\n\nThis fixes the following crash:\n\n==================================================================\nBUG: KASAN: slab-use-after-free in mgmt_remove_adv_monitor_sync+0x3a/0xd0 net/bluetooth/mgmt.c:5543\nRead of size 8 at addr ffff88814128f898 by task kworker/u9:4/5961\n\nCPU: 1 UID: 0 PID: 5961 Comm: kworker/u9:4 Not tainted 6.12.0-syzkaller-10684-gf1cd565ce577 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024\nWorkqueue: hci0 hci_cmd_sync_work\nCall Trace:\n \u003cTASK\u003e\n __dump_stack lib/dump_stack.c:94 [inline]\n dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:378 [inline]\n print_report+0x169/0x550 mm/kasan/report.c:489\n kasan_report+0x143/0x180 mm/kasan/report.c:602\n mgmt_remove_adv_monitor_sync+0x3a/0xd0 net/bluetooth/mgmt.c:5543\n hci_cmd_sync_work+0x22b/0x400 net/bluetooth/hci_sync.c:332\n process_one_work kernel/workqueue.c:3229 [inline]\n process_scheduled_works+0xa63/0x1850 kernel/workqueue.c:3310\n worker_thread+0x870/0xd30 kernel/workqueue.c:3391\n kthread+0x2f0/0x390 kernel/kthread.c:389\n ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147\n ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244\n \u003c/TASK\u003e\n\nAllocated by task 16026:\n kasan_save_stack mm/kasan/common.c:47 [inline]\n kasan_save_track+0x3f/0x80 mm/kasan/common.c:68\n poison_kmalloc_redzone mm/kasan/common.c:377 [inline]\n __kasan_kmalloc+0x98/0xb0 mm/kasan/common.c:394\n kasan_kmalloc include/linux/kasan.h:260 [inline]\n __kmalloc_cache_noprof+0x243/0x390 mm/slub.c:4314\n kmalloc_noprof include/linux/slab.h:901 [inline]\n kzalloc_noprof include/linux/slab.h:1037 [inline]\n mgmt_pending_new+0x65/0x250 net/bluetooth/mgmt_util.c:269\n mgmt_pending_add+0x36/0x120 net/bluetooth/mgmt_util.c:296\n remove_adv_monitor+0x102/0x1b0 net/bluetooth/mgmt.c:5568\n hci_mgmt_cmd+0xc47/0x11d0 net/bluetooth/hci_sock.c:1712\n hci_sock_sendmsg+0x7b8/0x11c0 net/bluetooth/hci_sock.c:1832\n sock_sendmsg_nosec net/socket.c:711 [inline]\n __sock_sendmsg+0x221/0x270 net/socket.c:726\n sock_write_iter+0x2d7/0x3f0 net/socket.c:1147\n new_sync_write fs/read_write.c:586 [inline]\n vfs_write+0xaeb/0xd30 fs/read_write.c:679\n ksys_write+0x18f/0x2b0 fs/read_write.c:731\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nFreed by task 16022:\n kasan_save_stack mm/kasan/common.c:47 [inline]\n kasan_save_track+0x3f/0x80 mm/kasan/common.c:68\n kasan_save_free_info+0x40/0x50 mm/kasan/generic.c:582\n poison_slab_object mm/kasan/common.c:247 [inline]\n __kasan_slab_free+0x59/0x70 mm/kasan/common.c:264\n kasan_slab_free include/linux/kasan.h:233 [inline]\n slab_free_hook mm/slub.c:2338 [inline]\n slab_free mm/slub.c:4598 [inline]\n kfree+0x196/0x420 mm/slub.c:4746\n mgmt_pending_foreach+0xd1/0x130 net/bluetooth/mgmt_util.c:259\n __mgmt_power_off+0x183/0x430 net/bluetooth/mgmt.c:9550\n hci_dev_close_sync+0x6c4/0x11c0 net/bluetooth/hci_sync.c:5208\n hci_dev_do_close net/bluetooth/hci_core.c:483 [inline]\n hci_dev_close+0x112/0x210 net/bluetooth/hci_core.c:508\n sock_do_ioctl+0x158/0x460 net/socket.c:1209\n sock_ioctl+0x626/0x8e0 net/socket.c:1328\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:906 [inline]\n __se_sys_ioctl+0xf5/0x170 fs/ioctl.c:892\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-6-1.1.s390x", "SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-6-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-58013", "url": "https://www.suse.com/security/cve/CVE-2024-58013" }, { "category": "external", "summary": "SUSE Bug 1239095 for CVE-2024-58013", "url": "https://bugzilla.suse.com/1239095" }, { "category": "external", "summary": "SUSE Bug 1239096 for CVE-2024-58013", "url": "https://bugzilla.suse.com/1239096" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-6-1.1.s390x", "SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-6-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-6-1.1.s390x", "SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-6-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-06-10T13:19:24Z", "details": "important" } ], "title": "CVE-2024-58013" }, { "cve": "CVE-2025-21680", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-21680" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\npktgen: Avoid out-of-bounds access in get_imix_entries\n\nPassing a sufficient amount of imix entries leads to invalid access to the\npkt_dev-\u003eimix_entries array because of the incorrect boundary check.\n\nUBSAN: array-index-out-of-bounds in net/core/pktgen.c:874:24\nindex 20 is out of range for type \u0027imix_pkt [20]\u0027\nCPU: 2 PID: 1210 Comm: bash Not tainted 6.10.0-rc1 #121\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996)\nCall Trace:\n\u003cTASK\u003e\ndump_stack_lvl lib/dump_stack.c:117\n__ubsan_handle_out_of_bounds lib/ubsan.c:429\nget_imix_entries net/core/pktgen.c:874\npktgen_if_write net/core/pktgen.c:1063\npde_write fs/proc/inode.c:334\nproc_reg_write fs/proc/inode.c:346\nvfs_write fs/read_write.c:593\nksys_write fs/read_write.c:644\ndo_syscall_64 arch/x86/entry/common.c:83\nentry_SYSCALL_64_after_hwframe arch/x86/entry/entry_64.S:130\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.\n\n[ fp: allow to fill the array completely; minor changelog cleanup ]", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-6-1.1.s390x", "SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-6-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-21680", "url": "https://www.suse.com/security/cve/CVE-2025-21680" }, { "category": "external", "summary": "SUSE Bug 1236700 for CVE-2025-21680", "url": "https://bugzilla.suse.com/1236700" }, { "category": "external", "summary": "SUSE Bug 1236701 for CVE-2025-21680", "url": "https://bugzilla.suse.com/1236701" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-6-1.1.s390x", "SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-6-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-6-1.1.s390x", "SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-6-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-06-10T13:19:24Z", "details": "important" } ], "title": "CVE-2025-21680" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…