Upstream information
Description
In the Linux kernel, the following vulnerability has been resolved:arm64: ftrace: fix module PLTs with mcount
Li Huafei reports that mcount-based ftrace with module PLTs was broken
by commit:
a6253579977e4c6f ("arm64: ftrace: consistently handle PLTs.")
When a module PLTs are used and a module is loaded sufficiently far away
from the kernel, we'll create PLTs for any branches which are
out-of-range. These are separate from the special ftrace trampoline
PLTs, which the module PLT code doesn't directly manipulate.
When mcount is in use this is a problem, as each mcount callsite in a
module will be initialized to point to a module PLT, but since commit
a6253579977e4c6f ftrace_make_nop() will assume that the callsite has
been initialized to point to the special ftrace trampoline PLT, and
ftrace_find_callable_addr() rejects other cases.
This means that when ftrace tries to initialize a callsite via
ftrace_make_nop(), the call to ftrace_find_callable_addr() will find
that the `_mcount` stub is out-of-range and is not handled by the ftrace
PLT, resulting in a splat:
| ftrace_test: loading out-of-tree module taints kernel.
| ftrace: no module PLT for _mcount
| ------------[ ftrace bug ]------------
| ftrace failed to modify
| [<ffff800029180014>] 0xffff800029180014
| actual: 44:00:00:94
| Initializing ftrace call sites
| ftrace record flags: 2000000
| (0)
| expected tramp: ffff80000802eb3c
| ------------[ cut here ]------------
| WARNING: CPU: 3 PID: 157 at kernel/trace/ftrace.c:2120 ftrace_bug+0x94/0x270
| Modules linked in:
| CPU: 3 PID: 157 Comm: insmod Tainted: G O 6.0.0-rc6-00151-gcd722513a189-dirty #22
| Hardware name: linux,dummy-virt (DT)
| pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
| pc : ftrace_bug+0x94/0x270
| lr : ftrace_bug+0x21c/0x270
| sp : ffff80000b2bbaf0
| x29: ffff80000b2bbaf0 x28: 0000000000000000 x27: ffff0000c4d38000
| x26: 0000000000000001 x25: ffff800009d7e000 x24: ffff0000c4d86e00
| x23: 0000000002000000 x22: ffff80000a62b000 x21: ffff8000098ebea8
| x20: ffff0000c4d38000 x19: ffff80000aa24158 x18: ffffffffffffffff
| x17: 0000000000000000 x16: 0a0d2d2d2d2d2d2d x15: ffff800009aa9118
| x14: 0000000000000000 x13: 6333626532303830 x12: 3030303866666666
| x11: 203a706d61727420 x10: 6465746365707865 x9 : 3362653230383030
| x8 : c0000000ffffefff x7 : 0000000000017fe8 x6 : 000000000000bff4
| x5 : 0000000000057fa8 x4 : 0000000000000000 x3 : 0000000000000001
| x2 : ad2cb14bb5438900 x1 : 0000000000000000 x0 : 0000000000000022
| Call trace:
| ftrace_bug+0x94/0x270
| ftrace_process_locs+0x308/0x430
| ftrace_module_init+0x44/0x60
| load_module+0x15b4/0x1ce8
| __do_sys_init_module+0x1ec/0x238
| __arm64_sys_init_module+0x24/0x30
| invoke_syscall+0x54/0x118
| el0_svc_common.constprop.4+0x84/0x100
| do_el0_svc+0x3c/0xd0
| el0_svc+0x1c/0x50
| el0t_64_sync_handler+0x90/0xb8
| el0t_64_sync+0x15c/0x160
| ---[ end trace 0000000000000000 ]---
| ---------test_init-----------
Fix this by reverting to the old behaviour of ignoring the old
instruction when initialising an mcount callsite in a module, which was
the behaviour prior to commit a6253579977e4c6f.
SUSE information
Overall state of this security issue: Resolved
This issue is currently rated as having moderate severity.
| CVSS detail | SUSE |
|---|---|
| Base Score | 4.1 |
| Vector | CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H |
| Attack Vector | Local |
| Attack Complexity | High |
| Privileges Required | High |
| User Interaction | None |
| Scope | Unchanged |
| Confidentiality Impact | None |
| Integrity Impact | None |
| Availability Impact | High |
| CVSSv3 Version | 3.1 |
| CVSS detail | SUSE |
|---|---|
| Base Score | 5.6 |
| Vector | CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N |
| Attack Vector | Local |
| Attack Complexity | High |
| Attack Requirements | None |
| Privileges Required | High |
| User Interaction | None |
| Vulnerable System Confidentiality Impact | None |
| Vulnerable System Integrity Impact | None |
| Vulnerable System Availability Impact | High |
| Subsequent System Confidentiality Impact | None |
| Subsequent System Integrity Impact | None |
| Subsequent System Availability Impact | None |
| CVSSv4 Version | 4.0 |
Note from the SUSE Security Team on the kernel-default package
SUSE will no longer fix all CVEs in the Linux Kernel anymore, but declare some bug classes as won't fix. Please refer to TID 21496 for more details. SUSE Bugzilla entry: 1252521 [RESOLVED / FIXED] No SUSE Security Announcements cross referenced.Status of this issue by product and package
Please note that this evaluation state might be work in progress, incomplete or outdated. Also information for service packs in the LTSS phase is only included for issues meeting the LTSS criteria. If in doubt, feel free to contact us for clarification. The updates are grouped by state of their lifecycle. SUSE product lifecycles are documented on the lifecycle page.
| Product(s) | Source package | State |
|---|---|---|
| Products under general support and receiving all security fixes. | ||
| SUSE Linux Enterprise Desktop 15 SP6 | kernel-default | Already fixed |
| SUSE Linux Enterprise Desktop 15 SP6 | kernel-source | Already fixed |
| SUSE Linux Enterprise Desktop 15 SP7 | kernel-default | Already fixed |
| SUSE Linux Enterprise Desktop 15 SP7 | kernel-source | Already fixed |
| SUSE Linux Enterprise High Availability Extension 15 SP7 | kernel-default | Already fixed |
| SUSE Linux Enterprise High Availability Extension 15 SP7 | kernel-source | Already fixed |
| SUSE Linux Enterprise High Performance Computing 15 SP6 | kernel-default | Already fixed |
| SUSE Linux Enterprise High Performance Computing 15 SP6 | kernel-source | Already fixed |
| SUSE Linux Enterprise High Performance Computing 15 SP6 | kernel-source-azure | Already fixed |
| SUSE Linux Enterprise High Performance Computing 15 SP7 | kernel-default | Already fixed |
| SUSE Linux Enterprise High Performance Computing 15 SP7 | kernel-source | Already fixed |
| SUSE Linux Enterprise High Performance Computing 15 SP7 | kernel-source-azure | Already fixed |
| SUSE Linux Enterprise Live Patching 15 SP6 | kernel-default | Already fixed |
| SUSE Linux Enterprise Live Patching 15 SP6 | kernel-source | Already fixed |
| SUSE Linux Enterprise Live Patching 15 SP7 | kernel-default | Already fixed |
| SUSE Linux Enterprise Live Patching 15 SP7 | kernel-source | Already fixed |
| SUSE Linux Enterprise Micro 5.1 | kernel-default | Not affected |
| SUSE Linux Enterprise Micro 5.1 | kernel-rt | Not affected |
| SUSE Linux Enterprise Micro 5.1 | kernel-source | Not affected |
| SUSE Linux Enterprise Micro 5.1 | kernel-source-rt | Not affected |
| SUSE Linux Enterprise Micro 5.2 | kernel-default | Not affected |
| SUSE Linux Enterprise Micro 5.2 | kernel-rt | Not affected |
| SUSE Linux Enterprise Micro 5.2 | kernel-source | Not affected |
| SUSE Linux Enterprise Micro 5.2 | kernel-source-rt | Not affected |
| SUSE Linux Enterprise Micro 5.3 | kernel-default | Already fixed |
| SUSE Linux Enterprise Micro 5.3 | kernel-rt | Already fixed |
| SUSE Linux Enterprise Micro 5.3 | kernel-source | Already fixed |
| SUSE Linux Enterprise Micro 5.3 | kernel-source-rt | Already fixed |
| SUSE Linux Enterprise Micro 5.4 | kernel-default | Already fixed |
| SUSE Linux Enterprise Micro 5.4 | kernel-rt | Already fixed |
| SUSE Linux Enterprise Micro 5.4 | kernel-source | Already fixed |
| SUSE Linux Enterprise Micro 5.4 | kernel-source-rt | Already fixed |
| SUSE Linux Enterprise Micro 5.5 | kernel-default | Already fixed |
| SUSE Linux Enterprise Micro 5.5 | kernel-source | Already fixed |
| SUSE Linux Enterprise Micro 5.5 | kernel-source-rt | Already fixed |
| SUSE Linux Enterprise Module for Basesystem 15 SP6 | kernel-default | Already fixed |
| SUSE Linux Enterprise Module for Basesystem 15 SP6 | kernel-source | Already fixed |
| SUSE Linux Enterprise Module for Basesystem 15 SP7 | kernel-default | Already fixed |
| SUSE Linux Enterprise Module for Basesystem 15 SP7 | kernel-source | Already fixed |
| SUSE Linux Enterprise Module for Development Tools 15 SP6 | kernel-default | Already fixed |
| SUSE Linux Enterprise Module for Development Tools 15 SP6 | kernel-source | Already fixed |
| SUSE Linux Enterprise Module for Development Tools 15 SP7 | kernel-default | Already fixed |
| SUSE Linux Enterprise Module for Development Tools 15 SP7 | kernel-source | Already fixed |
| SUSE Linux Enterprise Module for Legacy 15 SP6 | kernel-default | Already fixed |
| SUSE Linux Enterprise Module for Legacy 15 SP6 | kernel-source | Already fixed |
| SUSE Linux Enterprise Module for Legacy 15 SP7 | kernel-default | Already fixed |
| SUSE Linux Enterprise Module for Legacy 15 SP7 | kernel-source | Already fixed |
| SUSE Linux Enterprise Module for Public Cloud 15 SP6 | kernel-source-azure | Already fixed |
| SUSE Linux Enterprise Module for Public Cloud 15 SP7 | kernel-source-azure | Already fixed |
| SUSE Linux Enterprise Real Time 15 SP6 | kernel-source-rt | Already fixed |
| SUSE Linux Enterprise Real Time 15 SP7 | kernel-source-rt | Already fixed |
| SUSE Linux Enterprise Server 15 SP6 | kernel-default | Already fixed |
| SUSE Linux Enterprise Server 15 SP6 | kernel-source | Already fixed |
| SUSE Linux Enterprise Server 15 SP6 | kernel-source-azure | Already fixed |
| SUSE Linux Enterprise Server 15 SP7 | kernel-default | Already fixed |
| SUSE Linux Enterprise Server 15 SP7 | kernel-source | Already fixed |
| SUSE Linux Enterprise Server 15 SP7 | kernel-source-azure | Already fixed |
| SUSE Linux Enterprise Server for SAP Applications 15 SP6 | kernel-default | Already fixed |
| SUSE Linux Enterprise Server for SAP Applications 15 SP6 | kernel-source | Already fixed |
| SUSE Linux Enterprise Server for SAP Applications 15 SP6 | kernel-source-azure | Already fixed |
| SUSE Linux Enterprise Server for SAP Applications 15 SP7 | kernel-default | Already fixed |
| SUSE Linux Enterprise Server for SAP Applications 15 SP7 | kernel-source | Already fixed |
| SUSE Linux Enterprise Server for SAP Applications 15 SP7 | kernel-source-azure | Already fixed |
| SUSE Linux Enterprise Workstation Extension 15 SP6 | kernel-default | Already fixed |
| SUSE Linux Enterprise Workstation Extension 15 SP6 | kernel-source | Already fixed |
| SUSE Linux Enterprise Workstation Extension 15 SP7 | kernel-default | Already fixed |
| SUSE Linux Enterprise Workstation Extension 15 SP7 | kernel-source | Already fixed |
| SUSE Linux Micro 6.0 | kernel-default | Already fixed |
| SUSE Linux Micro 6.0 | kernel-source | Already fixed |
| SUSE Linux Micro 6.0 | kernel-source-rt | Already fixed |
| SUSE Linux Micro 6.1 | kernel-default | Already fixed |
| SUSE Linux Micro 6.1 | kernel-source | Already fixed |
| SUSE Linux Micro 6.1 | kernel-source-rt | Already fixed |
| SUSE Real Time Module 15 SP6 | kernel-source-rt | Already fixed |
| SUSE Real Time Module 15 SP7 | kernel-source-rt | Already fixed |
| openSUSE Leap 15.6 | kernel-default | Already fixed |
| openSUSE Leap 15.6 | kernel-source | Already fixed |
| openSUSE Leap 15.6 | kernel-source-azure | Already fixed |
| openSUSE Leap 15.6 | kernel-source-rt | Already fixed |
| Products under Long Term Service Pack support and receiving important and critical security fixes. | ||
| SUSE Linux Enterprise High Performance Computing 15 SP3 | kernel-source | Not affected |
| SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS | kernel-source | Not affected |
| SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS | kernel-default | Not affected |
| SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS | kernel-source | Not affected |
| SUSE Linux Enterprise High Performance Computing 15 SP4 | kernel-source | Already fixed |
| SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS | kernel-default | Already fixed |
| SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS | kernel-source | Already fixed |
| SUSE Linux Enterprise High Performance Computing 15 SP5 | kernel-source | Already fixed |
| SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS | kernel-default | Already fixed |
| SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS | kernel-source | Already fixed |
| SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS | kernel-default | Already fixed |
| SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS | kernel-source | Already fixed |
| SUSE Linux Enterprise Live Patching 12 SP5 | kernel-default | Not affected |
| SUSE Linux Enterprise Live Patching 12 SP5 | kernel-source | Not affected |
| SUSE Linux Enterprise Live Patching 15 SP3 | kernel-default | Not affected |
| SUSE Linux Enterprise Live Patching 15 SP3 | kernel-source | Not affected |
| SUSE Linux Enterprise Live Patching 15 SP4 | kernel-default | Already fixed |
| SUSE Linux Enterprise Live Patching 15 SP4 | kernel-source | Already fixed |
| SUSE Linux Enterprise Live Patching 15 SP5 | kernel-default | Already fixed |
| SUSE Linux Enterprise Live Patching 15 SP5 | kernel-source | Already fixed |
| SUSE Linux Enterprise Module for Basesystem 15 SP3 | kernel-source | Not affected |
| SUSE Linux Enterprise Module for Basesystem 15 SP4 | kernel-source | Already fixed |
| SUSE Linux Enterprise Module for Basesystem 15 SP5 | kernel-source | Already fixed |
| SUSE Linux Enterprise Module for Development Tools 15 SP3 | kernel-source | Not affected |
| SUSE Linux Enterprise Module for Development Tools 15 SP4 | kernel-source | Already fixed |
| SUSE Linux Enterprise Module for Development Tools 15 SP5 | kernel-source | Already fixed |
| SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE | kernel-default | Not affected |
| SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE | kernel-source | Not affected |
| SUSE Linux Enterprise Server 12 SP5 | kernel-source | Not affected |
| SUSE Linux Enterprise Server 12 SP5-LTSS | kernel-default | Not affected |
| SUSE Linux Enterprise Server 12 SP5-LTSS | kernel-source | Not affected |
| SUSE Linux Enterprise Server 12 SP5-LTSS Extended Security | kernel-default | Not affected |
| SUSE Linux Enterprise Server 12 SP5-LTSS Extended Security | kernel-source | Not affected |
| SUSE Linux Enterprise Server 15 SP3 | kernel-source | Not affected |
| SUSE Linux Enterprise Server 15 SP3-LTSS | kernel-default | Not affected |
| SUSE Linux Enterprise Server 15 SP3-LTSS | kernel-source | Not affected |
| SUSE Linux Enterprise Server 15 SP4 | kernel-source | Already fixed |
| SUSE Linux Enterprise Server 15 SP4-LTSS | kernel-default | Already fixed |
| SUSE Linux Enterprise Server 15 SP4-LTSS | kernel-source | Already fixed |
| SUSE Linux Enterprise Server 15 SP5 | kernel-source | Already fixed |
| SUSE Linux Enterprise Server 15 SP5-LTSS | kernel-default | Already fixed |
| SUSE Linux Enterprise Server 15 SP5-LTSS | kernel-source | Already fixed |
| SUSE Linux Enterprise Server LTSS Extended Security 12 SP5 | kernel-source | Not affected |
| SUSE Manager Proxy 4.3 | kernel-source | Already fixed |
| SUSE Manager Proxy LTS 4.3 | kernel-default | Already fixed |
| SUSE Manager Proxy LTS 4.3 | kernel-source | Already fixed |
| SUSE Manager Retail Branch Server 4.3 | kernel-source | Already fixed |
| SUSE Manager Retail Branch Server LTS 4.3 | kernel-default | Already fixed |
| SUSE Manager Retail Branch Server LTS 4.3 | kernel-source | Already fixed |
| SUSE Manager Server 4.3 | kernel-source | Already fixed |
| SUSE Manager Server LTS 4.3 | kernel-default | Already fixed |
| SUSE Manager Server LTS 4.3 | kernel-source | Already fixed |
| Products past their end of life and not receiving proactive updates anymore. | ||
| SUSE CaaS Platform 4.0 | kernel-source | Not affected |
| SUSE Enterprise Storage 6 | kernel-source | Not affected |
| SUSE Enterprise Storage 7 | kernel-source | Not affected |
| SUSE Enterprise Storage 7.1 | kernel-source | Not affected |
| SUSE Linux Enterprise Desktop 11 SP4 | kernel-source | Not affected |
| SUSE Linux Enterprise Desktop 12 SP2 | kernel-source | Not affected |
| SUSE Linux Enterprise Desktop 12 SP4 | kernel-source | Not affected |
| SUSE Linux Enterprise Desktop 15 | kernel-source | Not affected |
| SUSE Linux Enterprise Desktop 15 SP1 | kernel-source | Not affected |
| SUSE Linux Enterprise Desktop 15 SP2 | kernel-source | Not affected |
| SUSE Linux Enterprise Desktop 15 SP3 | kernel-source | Not affected |
| SUSE Linux Enterprise Desktop 15 SP4 | kernel-source | Already fixed |
| SUSE Linux Enterprise Desktop 15 SP5 | kernel-source | Already fixed |
| SUSE Linux Enterprise High Performance Computing 15 | kernel-source | Not affected |
| SUSE Linux Enterprise High Performance Computing 15 SP1 | kernel-source | Not affected |
| SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS | kernel-source | Not affected |
| SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS | kernel-source | Not affected |
| SUSE Linux Enterprise High Performance Computing 15 SP2 | kernel-source | Not affected |
| SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS | kernel-source | Not affected |
| SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS | kernel-source | Not affected |
| SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS | kernel-source | Already fixed |
| SUSE Linux Enterprise High Performance Computing 15-ESPOS | kernel-source | Not affected |
| SUSE Linux Enterprise High Performance Computing 15-LTSS | kernel-source | Not affected |
| SUSE Linux Enterprise Micro 5.0 | kernel-default | Not affected |
| SUSE Linux Enterprise Module for Basesystem 15 | kernel-source | Not affected |
| SUSE Linux Enterprise Module for Basesystem 15 SP1 | kernel-source | Not affected |
| SUSE Linux Enterprise Module for Basesystem 15 SP2 | kernel-source | Not affected |
| SUSE Linux Enterprise Module for Development Tools 15 | kernel-source | Not affected |
| SUSE Linux Enterprise Module for Development Tools 15 SP1 | kernel-source | Not affected |
| SUSE Linux Enterprise Module for Development Tools 15 SP2 | kernel-source | Not affected |
| SUSE Linux Enterprise Point of Sale 12 SP2-CLIENT | kernel-source | Not affected |
| SUSE Linux Enterprise Real Time 15 SP2 | kernel-source | Not affected |
| SUSE Linux Enterprise Real Time 15 SP3 | kernel-source | Not affected |
| SUSE Linux Enterprise Real Time 15 SP3 | kernel-source-rt | Not affected |
| SUSE Linux Enterprise Real Time 15 SP4 | kernel-source | Already fixed |
| SUSE Linux Enterprise Real Time 15 SP4 | kernel-source-rt | Already fixed |
| SUSE Linux Enterprise Real Time 15 SP5 | kernel-source-rt | Already fixed |
| SUSE Linux Enterprise Server 11 SP4 | kernel-source | Not affected |
| SUSE Linux Enterprise Server 11 SP4 LTSS | kernel-default | Not affected |
| SUSE Linux Enterprise Server 11 SP4 LTSS | kernel-source | Not affected |
| SUSE Linux Enterprise Server 11 SP4-LTSS | kernel-source | Not affected |
| SUSE Linux Enterprise Server 12 SP2 | kernel-source | Not affected |
| SUSE Linux Enterprise Server 12 SP2-BCL | kernel-source | Not affected |
| SUSE Linux Enterprise Server 12 SP2-ESPOS | kernel-source | Not affected |
| SUSE Linux Enterprise Server 12 SP2-LTSS | kernel-default | Not affected |
| SUSE Linux Enterprise Server 12 SP2-LTSS | kernel-source | Not affected |
| SUSE Linux Enterprise Server 12 SP4 | kernel-source | Not affected |
| SUSE Linux Enterprise Server 12 SP4-ESPOS | kernel-source | Not affected |
| SUSE Linux Enterprise Server 12 SP4-LTSS | kernel-default | Not affected |
| SUSE Linux Enterprise Server 12 SP4-LTSS | kernel-source | Not affected |
| SUSE Linux Enterprise Server 15 | kernel-source | Not affected |
| SUSE Linux Enterprise Server 15 SP1 | kernel-source | Not affected |
| SUSE Linux Enterprise Server 15 SP1-BCL | kernel-source | Not affected |
| SUSE Linux Enterprise Server 15 SP1-LTSS | kernel-default | Not affected |
| SUSE Linux Enterprise Server 15 SP1-LTSS | kernel-source | Not affected |
| SUSE Linux Enterprise Server 15 SP2 | kernel-source | Not affected |
| SUSE Linux Enterprise Server 15 SP2-BCL | kernel-source | Not affected |
| SUSE Linux Enterprise Server 15 SP2-LTSS | kernel-default | Not affected |
| SUSE Linux Enterprise Server 15 SP2-LTSS | kernel-source | Not affected |
| SUSE Linux Enterprise Server 15 SP3-BCL | kernel-source | Not affected |
| SUSE Linux Enterprise Server 15-LTSS | kernel-default | Not affected |
| SUSE Linux Enterprise Server 15-LTSS | kernel-source | Not affected |
| SUSE Linux Enterprise Server for Raspberry Pi 12 SP2 | kernel-source | Not affected |
| SUSE Linux Enterprise Server for SAP Applications 12 SP2 | kernel-source | Not affected |
| SUSE Linux Enterprise Server for SAP Applications 12 SP4 | kernel-source | Not affected |
| SUSE Linux Enterprise Server for SAP Applications 15 | kernel-source | Not affected |
| SUSE Linux Enterprise Server for SAP Applications 15 SP1 | kernel-source | Not affected |
| SUSE Linux Enterprise Server for SAP Applications 15 SP2 | kernel-source | Not affected |
| SUSE Linux Enterprise Server for SAP Applications 15 SP3 | kernel-default | Not affected |
| SUSE Linux Enterprise Server for SAP Applications 15 SP3 | kernel-source | Not affected |
| SUSE Linux Enterprise Server for SAP Applications 15 SP4 | kernel-default | Already fixed |
| SUSE Linux Enterprise Server for SAP Applications 15 SP4 | kernel-source | Already fixed |
| SUSE Linux Enterprise Server for SAP Applications 15 SP5 | kernel-default | Already fixed |
| SUSE Linux Enterprise Server for SAP Applications 15 SP5 | kernel-source | Already fixed |
| SUSE Manager Proxy 4.0 | kernel-source | Not affected |
| SUSE Manager Proxy 4.1 | kernel-source | Not affected |
| SUSE Manager Proxy 4.2 | kernel-source | Not affected |
| SUSE Manager Retail Branch Server 4.0 | kernel-source | Not affected |
| SUSE Manager Retail Branch Server 4.1 | kernel-source | Not affected |
| SUSE Manager Retail Branch Server 4.2 | kernel-source | Not affected |
| SUSE Manager Server 4.0 | kernel-source | Not affected |
| SUSE Manager Server 4.1 | kernel-source | Not affected |
| SUSE Manager Server 4.2 | kernel-source | Not affected |
| SUSE OpenStack Cloud 7 | kernel-source | Not affected |
| SUSE OpenStack Cloud 9 | kernel-source | Not affected |
| SUSE OpenStack Cloud Crowbar 9 | kernel-source | Not affected |
| SUSE Real Time Module 15 SP3 | kernel-source-rt | Not affected |
| SUSE Real Time Module 15 SP4 | kernel-source-rt | Already fixed |
| SUSE Real Time Module 15 SP5 | kernel-source-rt | Already fixed |
| openSUSE Leap 15.3 | kernel-source | Not affected |
| openSUSE Leap 15.3 | kernel-source-rt | Not affected |
| openSUSE Leap 15.4 | kernel-source | Already fixed |
| openSUSE Leap 15.4 | kernel-source-rt | Already fixed |
| openSUSE Leap 15.5 | kernel-source | Already fixed |
| openSUSE Leap 15.5 | kernel-source-rt | Already fixed |
SUSE Timeline for this CVE
CVE page created: Wed Oct 22 16:20:31 2025CVE page last modified: Fri Oct 24 20:06:22 2025