Upstream information
Description
In the Linux kernel, the following vulnerability has been resolved:btrfs: do not assert we found block group item when creating free space tree
Currently, when building a free space tree at populate_free_space_tree(),
if we are not using the block group tree feature, we always expect to find
block group items (either extent items or a block group item with key type
BTRFS_BLOCK_GROUP_ITEM_KEY) when we search the extent tree with
btrfs_search_slot_for_read(), so we assert that we found an item. However
this expectation is wrong since we can have a new block group created in
the current transaction which is still empty and for which we still have
not added the block group's item to the extent tree, in which case we do
not have any items in the extent tree associated to the block group.
The insertion of a new block group's block group item in the extent tree
happens at btrfs_create_pending_block_groups() when it calls the helper
insert_block_group_item(). This typically is done when a transaction
handle is released, committed or when running delayed refs (either as
part of a transaction commit or when serving tickets for space reservation
if we are low on free space).
So remove the assertion at populate_free_space_tree() even when the block
group tree feature is not enabled and update the comment to mention this
case.
Syzbot reported this with the following stack trace:
BTRFS info (device loop3 state M): rebuilding free space tree
assertion failed: ret == 0 :: 0, in fs/btrfs/free-space-tree.c:1115
------------[ cut here ]------------
kernel BUG at fs/btrfs/free-space-tree.c:1115!
Oops: invalid opcode: 0000 [#1] SMP KASAN PTI
CPU: 1 UID: 0 PID: 6352 Comm: syz.3.25 Not tainted syzkaller #0 PREEMPT(full)
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025
RIP: 0010:populate_free_space_tree+0x700/0x710 fs/btrfs/free-space-tree.c:1115
Code: ff ff e8 d3 (...)
RSP: 0018:ffffc9000430f780 EFLAGS: 00010246
RAX: 0000000000000043 RBX: ffff88805b709630 RCX: fea61d0e2e79d000
RDX: 0000000000000000 RSI: 0000000080000000 RDI: 0000000000000000
RBP: ffffc9000430f8b0 R08: ffffc9000430f4a7 R09: 1ffff92000861e94
R10: dffffc0000000000 R11: fffff52000861e95 R12: 0000000000000001
R13: 1ffff92000861f00 R14: dffffc0000000000 R15: 0000000000000000
FS: 00007f424d9fe6c0(0000) GS:ffff888125afc000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fd78ad212c0 CR3: 0000000076d68000 CR4: 00000000003526f0
Call Trace:
<TASK>
btrfs_rebuild_free_space_tree+0x1ba/0x6d0 fs/btrfs/free-space-tree.c:1364
btrfs_start_pre_rw_mount+0x128f/0x1bf0 fs/btrfs/disk-io.c:3062
btrfs_remount_rw fs/btrfs/super.c:1334 [inline]
btrfs_reconfigure+0xaed/0x2160 fs/btrfs/super.c:1559
reconfigure_super+0x227/0x890 fs/super.c:1076
do_remount fs/namespace.c:3279 [inline]
path_mount+0xd1a/0xfe0 fs/namespace.c:4027
do_mount fs/namespace.c:4048 [inline]
__do_sys_mount fs/namespace.c:4236 [inline]
__se_sys_mount+0x313/0x410 fs/namespace.c:4213
do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
do_syscall_64+0xfa/0xfa0 arch/x86/entry/syscall_64.c:94
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f424e39066a
Code: d8 64 89 02 (...)
RSP: 002b:00007f424d9fde68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5
RAX: ffffffffffffffda RBX: 00007f424d9fdef0 RCX: 00007f424e39066a
RDX: 0000200000000180 RSI: 0000200000000380 RDI: 0000000000000000
RBP: 0000200000000180 R08: 00007f424d9fdef0 R09: 0000000000000020
R10: 0000000000000020 R11: 0000000000000246 R12: 0000200000000380
R13: 00007f424d9fdeb0 R14: 0000000000000000 R15: 00002000000002c0
</TASK>
Modules linked in:
---[ end trace 0000000000000000 ]---
SUSE information
Overall state of this security issue: Pending
This issue is currently rated as having moderate severity.
| CVSS detail | SUSE | 
|---|---|
| Base Score | 5.5 | 
| Vector | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H | 
| Attack Vector | Local | 
| Attack Complexity | Low | 
| Privileges Required | Low | 
| User Interaction | None | 
| Scope | Unchanged | 
| Confidentiality Impact | None | 
| Integrity Impact | None | 
| Availability Impact | High | 
| CVSSv3 Version | 3.1 | 
| CVSS detail | SUSE | 
|---|---|
| Base Score | 6.8 | 
| Vector | CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N | 
| Attack Vector | Local | 
| Attack Complexity | Low | 
| Attack Requirements | None | 
| Privileges Required | Low | 
| User Interaction | None | 
| Vulnerable System Confidentiality Impact | None | 
| Vulnerable System Integrity Impact | None | 
| Vulnerable System Availability Impact | High | 
| Subsequent System Confidentiality Impact | None | 
| Subsequent System Integrity Impact | None | 
| Subsequent System Availability Impact | None | 
| CVSSv4 Version | 4.0 | 
Note from the SUSE Security Team on the kernel-default package
SUSE will no longer fix all CVEs in the Linux Kernel anymore, but declare some bug classes as won't fix. Please refer to TID 21496 for more details. SUSE Bugzilla entry: 1252918 [NEW] No SUSE Security Announcements cross referenced.Status of this issue by product and package
Please note that this evaluation state might be work in progress, incomplete or outdated. Also information for service packs in the LTSS phase is only included for issues meeting the LTSS criteria. If in doubt, feel free to contact us for clarification. The updates are grouped by state of their lifecycle. SUSE product lifecycles are documented on the lifecycle page.
| Product(s) | Source package | State | 
|---|---|---|
| Products under general support and receiving all security fixes. | ||
| SUSE Linux Enterprise Desktop 15 SP6 | kernel-default | Affected | 
| SUSE Linux Enterprise Desktop 15 SP6 | kernel-source | Affected | 
| SUSE Linux Enterprise Desktop 15 SP7 | kernel-default | Affected | 
| SUSE Linux Enterprise Desktop 15 SP7 | kernel-source | Affected | 
| SUSE Linux Enterprise High Availability Extension 15 SP7 | kernel-default | Affected | 
| SUSE Linux Enterprise High Availability Extension 15 SP7 | kernel-source | Affected | 
| SUSE Linux Enterprise High Performance Computing 15 SP6 | kernel-default | Affected | 
| SUSE Linux Enterprise High Performance Computing 15 SP6 | kernel-source | Affected | 
| SUSE Linux Enterprise High Performance Computing 15 SP6 | kernel-source-azure | Affected | 
| SUSE Linux Enterprise High Performance Computing 15 SP7 | kernel-default | Affected | 
| SUSE Linux Enterprise High Performance Computing 15 SP7 | kernel-source | Affected | 
| SUSE Linux Enterprise High Performance Computing 15 SP7 | kernel-source-azure | Affected | 
| SUSE Linux Enterprise Live Patching 15 SP6 | kernel-default | Affected | 
| SUSE Linux Enterprise Live Patching 15 SP6 | kernel-source | Affected | 
| SUSE Linux Enterprise Live Patching 15 SP7 | kernel-default | Affected | 
| SUSE Linux Enterprise Live Patching 15 SP7 | kernel-source | Affected | 
| SUSE Linux Enterprise Micro 5.1 | kernel-default | Affected | 
| SUSE Linux Enterprise Micro 5.1 | kernel-rt | Affected | 
| SUSE Linux Enterprise Micro 5.1 | kernel-source | Affected | 
| SUSE Linux Enterprise Micro 5.1 | kernel-source-rt | Affected | 
| SUSE Linux Enterprise Micro 5.2 | kernel-default | Affected | 
| SUSE Linux Enterprise Micro 5.2 | kernel-rt | Affected | 
| SUSE Linux Enterprise Micro 5.2 | kernel-source | Affected | 
| SUSE Linux Enterprise Micro 5.2 | kernel-source-rt | Affected | 
| SUSE Linux Enterprise Micro 5.3 | kernel-default | Affected | 
| SUSE Linux Enterprise Micro 5.3 | kernel-rt | Affected | 
| SUSE Linux Enterprise Micro 5.3 | kernel-source | Affected | 
| SUSE Linux Enterprise Micro 5.3 | kernel-source-rt | Affected | 
| SUSE Linux Enterprise Micro 5.4 | kernel-default | Affected | 
| SUSE Linux Enterprise Micro 5.4 | kernel-rt | Affected | 
| SUSE Linux Enterprise Micro 5.4 | kernel-source | Affected | 
| SUSE Linux Enterprise Micro 5.4 | kernel-source-rt | Affected | 
| SUSE Linux Enterprise Micro 5.5 | kernel-default | Affected | 
| SUSE Linux Enterprise Micro 5.5 | kernel-source | Affected | 
| SUSE Linux Enterprise Micro 5.5 | kernel-source-rt | Affected | 
| SUSE Linux Enterprise Module for Basesystem 15 SP6 | kernel-default | Affected | 
| SUSE Linux Enterprise Module for Basesystem 15 SP6 | kernel-source | Affected | 
| SUSE Linux Enterprise Module for Basesystem 15 SP7 | kernel-default | Affected | 
| SUSE Linux Enterprise Module for Basesystem 15 SP7 | kernel-source | Affected | 
| SUSE Linux Enterprise Module for Development Tools 15 SP6 | kernel-default | Affected | 
| SUSE Linux Enterprise Module for Development Tools 15 SP6 | kernel-source | Affected | 
| SUSE Linux Enterprise Module for Development Tools 15 SP7 | kernel-default | Affected | 
| SUSE Linux Enterprise Module for Development Tools 15 SP7 | kernel-source | Affected | 
| SUSE Linux Enterprise Module for Legacy 15 SP6 | kernel-default | Affected | 
| SUSE Linux Enterprise Module for Legacy 15 SP6 | kernel-source | Affected | 
| SUSE Linux Enterprise Module for Legacy 15 SP7 | kernel-default | Affected | 
| SUSE Linux Enterprise Module for Legacy 15 SP7 | kernel-source | Affected | 
| SUSE Linux Enterprise Module for Public Cloud 15 SP6 | kernel-source-azure | Affected | 
| SUSE Linux Enterprise Module for Public Cloud 15 SP7 | kernel-source-azure | Affected | 
| SUSE Linux Enterprise Real Time 15 SP6 | kernel-source-rt | Affected | 
| SUSE Linux Enterprise Real Time 15 SP7 | kernel-source-rt | Affected | 
| SUSE Linux Enterprise Server 15 SP6 | kernel-default | Affected | 
| SUSE Linux Enterprise Server 15 SP6 | kernel-source | Affected | 
| SUSE Linux Enterprise Server 15 SP6 | kernel-source-azure | Affected | 
| SUSE Linux Enterprise Server 15 SP7 | kernel-default | Affected | 
| SUSE Linux Enterprise Server 15 SP7 | kernel-source | Affected | 
| SUSE Linux Enterprise Server 15 SP7 | kernel-source-azure | Affected | 
| SUSE Linux Enterprise Server for SAP Applications 15 SP6 | kernel-default | Affected | 
| SUSE Linux Enterprise Server for SAP Applications 15 SP6 | kernel-source | Affected | 
| SUSE Linux Enterprise Server for SAP Applications 15 SP6 | kernel-source-azure | Affected | 
| SUSE Linux Enterprise Server for SAP Applications 15 SP7 | kernel-default | Affected | 
| SUSE Linux Enterprise Server for SAP Applications 15 SP7 | kernel-source | Affected | 
| SUSE Linux Enterprise Server for SAP Applications 15 SP7 | kernel-source-azure | Affected | 
| SUSE Linux Enterprise Workstation Extension 15 SP6 | kernel-default | Affected | 
| SUSE Linux Enterprise Workstation Extension 15 SP6 | kernel-source | Affected | 
| SUSE Linux Enterprise Workstation Extension 15 SP7 | kernel-default | Affected | 
| SUSE Linux Enterprise Workstation Extension 15 SP7 | kernel-source | Affected | 
| SUSE Linux Micro 6.0 | kernel-default | Affected | 
| SUSE Linux Micro 6.0 | kernel-source | Affected | 
| SUSE Linux Micro 6.0 | kernel-source-rt | Affected | 
| SUSE Linux Micro 6.1 | kernel-default | Affected | 
| SUSE Linux Micro 6.1 | kernel-source | Affected | 
| SUSE Linux Micro 6.1 | kernel-source-rt | Affected | 
| SUSE Real Time Module 15 SP6 | kernel-source-rt | Affected | 
| SUSE Real Time Module 15 SP7 | kernel-source-rt | Affected | 
| openSUSE Leap 15.6 | kernel-default | Affected | 
| openSUSE Leap 15.6 | kernel-source | Affected | 
| openSUSE Leap 15.6 | kernel-source-azure | Affected | 
| openSUSE Leap 15.6 | kernel-source-rt | Affected | 
| Products under Long Term Service Pack support and receiving important and critical security fixes. | ||
| SUSE Linux Enterprise High Performance Computing 15 SP3 | kernel-source | Affected | 
| SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS | kernel-source | Affected | 
| SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS | kernel-default | Affected | 
| SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS | kernel-source | Affected | 
| SUSE Linux Enterprise High Performance Computing 15 SP4 | kernel-source | Affected | 
| SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS | kernel-default | Affected | 
| SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS | kernel-source | Affected | 
| SUSE Linux Enterprise High Performance Computing 15 SP5 | kernel-source | Affected | 
| SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS | kernel-default | Affected | 
| SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS | kernel-source | Affected | 
| SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS | kernel-default | Affected | 
| SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS | kernel-source | Affected | 
| SUSE Linux Enterprise Live Patching 12 SP5 | kernel-default | Affected | 
| SUSE Linux Enterprise Live Patching 12 SP5 | kernel-source | Affected | 
| SUSE Linux Enterprise Live Patching 15 SP3 | kernel-default | Affected | 
| SUSE Linux Enterprise Live Patching 15 SP3 | kernel-source | Affected | 
| SUSE Linux Enterprise Live Patching 15 SP4 | kernel-default | Affected | 
| SUSE Linux Enterprise Live Patching 15 SP4 | kernel-source | Affected | 
| SUSE Linux Enterprise Live Patching 15 SP5 | kernel-default | Affected | 
| SUSE Linux Enterprise Live Patching 15 SP5 | kernel-source | Affected | 
| SUSE Linux Enterprise Module for Basesystem 15 SP3 | kernel-source | Affected | 
| SUSE Linux Enterprise Module for Basesystem 15 SP4 | kernel-source | Affected | 
| SUSE Linux Enterprise Module for Basesystem 15 SP5 | kernel-source | Affected | 
| SUSE Linux Enterprise Module for Development Tools 15 SP3 | kernel-source | Affected | 
| SUSE Linux Enterprise Module for Development Tools 15 SP4 | kernel-source | Affected | 
| SUSE Linux Enterprise Module for Development Tools 15 SP5 | kernel-source | Affected | 
| SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE | kernel-default | Not affected | 
| SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE | kernel-source | Not affected | 
| SUSE Linux Enterprise Server 12 SP5 | kernel-source | Affected | 
| SUSE Linux Enterprise Server 12 SP5-LTSS | kernel-default | Affected | 
| SUSE Linux Enterprise Server 12 SP5-LTSS | kernel-source | Affected | 
| SUSE Linux Enterprise Server 12 SP5-LTSS Extended Security | kernel-default | Affected | 
| SUSE Linux Enterprise Server 12 SP5-LTSS Extended Security | kernel-source | Affected | 
| SUSE Linux Enterprise Server 15 SP3 | kernel-source | Affected | 
| SUSE Linux Enterprise Server 15 SP3-LTSS | kernel-default | Affected | 
| SUSE Linux Enterprise Server 15 SP3-LTSS | kernel-source | Affected | 
| SUSE Linux Enterprise Server 15 SP4 | kernel-source | Affected | 
| SUSE Linux Enterprise Server 15 SP4-LTSS | kernel-default | Affected | 
| SUSE Linux Enterprise Server 15 SP4-LTSS | kernel-source | Affected | 
| SUSE Linux Enterprise Server 15 SP5 | kernel-source | Affected | 
| SUSE Linux Enterprise Server 15 SP5-LTSS | kernel-default | Affected | 
| SUSE Linux Enterprise Server 15 SP5-LTSS | kernel-source | Affected | 
| SUSE Linux Enterprise Server LTSS Extended Security 12 SP5 | kernel-source | Affected | 
| SUSE Manager Proxy 4.3 | kernel-source | Affected | 
| SUSE Manager Proxy LTS 4.3 | kernel-default | Affected | 
| SUSE Manager Proxy LTS 4.3 | kernel-source | Affected | 
| SUSE Manager Retail Branch Server 4.3 | kernel-source | Affected | 
| SUSE Manager Retail Branch Server LTS 4.3 | kernel-default | Affected | 
| SUSE Manager Retail Branch Server LTS 4.3 | kernel-source | Affected | 
| SUSE Manager Server 4.3 | kernel-source | Affected | 
| SUSE Manager Server LTS 4.3 | kernel-default | Affected | 
| SUSE Manager Server LTS 4.3 | kernel-source | Affected | 
| Products past their end of life and not receiving proactive updates anymore. | ||
| SUSE CaaS Platform 4.0 | kernel-source | Affected | 
| SUSE Enterprise Storage 6 | kernel-source | Affected | 
| SUSE Enterprise Storage 7 | kernel-source | Affected | 
| SUSE Enterprise Storage 7.1 | kernel-source | Affected | 
| SUSE Linux Enterprise Desktop 11 SP4 | kernel-source | Not affected | 
| SUSE Linux Enterprise Desktop 12 SP2 | kernel-source | Not affected | 
| SUSE Linux Enterprise Desktop 12 SP4 | kernel-source | Affected | 
| SUSE Linux Enterprise Desktop 15 | kernel-source | Affected | 
| SUSE Linux Enterprise Desktop 15 SP1 | kernel-source | Affected | 
| SUSE Linux Enterprise Desktop 15 SP2 | kernel-source | Affected | 
| SUSE Linux Enterprise Desktop 15 SP3 | kernel-source | Affected | 
| SUSE Linux Enterprise Desktop 15 SP4 | kernel-source | Affected | 
| SUSE Linux Enterprise Desktop 15 SP5 | kernel-source | Affected | 
| SUSE Linux Enterprise High Performance Computing 15 | kernel-source | Affected | 
| SUSE Linux Enterprise High Performance Computing 15 SP1 | kernel-source | Affected | 
| SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS | kernel-source | Affected | 
| SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS | kernel-source | Affected | 
| SUSE Linux Enterprise High Performance Computing 15 SP2 | kernel-source | Affected | 
| SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS | kernel-source | Affected | 
| SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS | kernel-source | Affected | 
| SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS | kernel-source | Affected | 
| SUSE Linux Enterprise High Performance Computing 15-ESPOS | kernel-source | Affected | 
| SUSE Linux Enterprise High Performance Computing 15-LTSS | kernel-source | Affected | 
| SUSE Linux Enterprise Micro 5.0 | kernel-default | Affected | 
| SUSE Linux Enterprise Module for Basesystem 15 | kernel-source | Affected | 
| SUSE Linux Enterprise Module for Basesystem 15 SP1 | kernel-source | Affected | 
| SUSE Linux Enterprise Module for Basesystem 15 SP2 | kernel-source | Affected | 
| SUSE Linux Enterprise Module for Development Tools 15 | kernel-source | Affected | 
| SUSE Linux Enterprise Module for Development Tools 15 SP1 | kernel-source | Affected | 
| SUSE Linux Enterprise Module for Development Tools 15 SP2 | kernel-source | Affected | 
| SUSE Linux Enterprise Point of Sale 12 SP2-CLIENT | kernel-source | Not affected | 
| SUSE Linux Enterprise Real Time 15 SP2 | kernel-source | Affected | 
| SUSE Linux Enterprise Real Time 15 SP3 | kernel-source | Affected | 
| SUSE Linux Enterprise Real Time 15 SP3 | kernel-source-rt | Affected | 
| SUSE Linux Enterprise Real Time 15 SP4 | kernel-source | Affected | 
| SUSE Linux Enterprise Real Time 15 SP4 | kernel-source-rt | Affected | 
| SUSE Linux Enterprise Real Time 15 SP5 | kernel-source-rt | Affected | 
| SUSE Linux Enterprise Server 11 SP4 | kernel-source | Not affected | 
| SUSE Linux Enterprise Server 11 SP4 LTSS | kernel-default | Not affected | 
| SUSE Linux Enterprise Server 11 SP4 LTSS | kernel-source | Not affected | 
| SUSE Linux Enterprise Server 11 SP4-LTSS | kernel-source | Not affected | 
| SUSE Linux Enterprise Server 12 SP2 | kernel-source | Not affected | 
| SUSE Linux Enterprise Server 12 SP2-BCL | kernel-source | Not affected | 
| SUSE Linux Enterprise Server 12 SP2-ESPOS | kernel-source | Not affected | 
| SUSE Linux Enterprise Server 12 SP2-LTSS | kernel-default | Not affected | 
| SUSE Linux Enterprise Server 12 SP2-LTSS | kernel-source | Not affected | 
| SUSE Linux Enterprise Server 12 SP4 | kernel-source | Affected | 
| SUSE Linux Enterprise Server 12 SP4-ESPOS | kernel-source | Affected | 
| SUSE Linux Enterprise Server 12 SP4-LTSS | kernel-default | Affected | 
| SUSE Linux Enterprise Server 12 SP4-LTSS | kernel-source | Affected | 
| SUSE Linux Enterprise Server 15 | kernel-source | Affected | 
| SUSE Linux Enterprise Server 15 SP1 | kernel-source | Affected | 
| SUSE Linux Enterprise Server 15 SP1-BCL | kernel-source | Affected | 
| SUSE Linux Enterprise Server 15 SP1-LTSS | kernel-default | Affected | 
| SUSE Linux Enterprise Server 15 SP1-LTSS | kernel-source | Affected | 
| SUSE Linux Enterprise Server 15 SP2 | kernel-source | Affected | 
| SUSE Linux Enterprise Server 15 SP2-BCL | kernel-source | Affected | 
| SUSE Linux Enterprise Server 15 SP2-LTSS | kernel-default | Affected | 
| SUSE Linux Enterprise Server 15 SP2-LTSS | kernel-source | Affected | 
| SUSE Linux Enterprise Server 15 SP3-BCL | kernel-source | Affected | 
| SUSE Linux Enterprise Server 15-LTSS | kernel-default | Affected | 
| SUSE Linux Enterprise Server 15-LTSS | kernel-source | Affected | 
| SUSE Linux Enterprise Server for Raspberry Pi 12 SP2 | kernel-source | Not affected | 
| SUSE Linux Enterprise Server for SAP Applications 12 SP2 | kernel-source | Not affected | 
| SUSE Linux Enterprise Server for SAP Applications 12 SP4 | kernel-source | Affected | 
| SUSE Linux Enterprise Server for SAP Applications 15 | kernel-source | Affected | 
| SUSE Linux Enterprise Server for SAP Applications 15 SP1 | kernel-source | Affected | 
| SUSE Linux Enterprise Server for SAP Applications 15 SP2 | kernel-source | Affected | 
| SUSE Linux Enterprise Server for SAP Applications 15 SP3 | kernel-default | Affected | 
| SUSE Linux Enterprise Server for SAP Applications 15 SP3 | kernel-source | Affected | 
| SUSE Linux Enterprise Server for SAP Applications 15 SP4 | kernel-default | Affected | 
| SUSE Linux Enterprise Server for SAP Applications 15 SP4 | kernel-source | Affected | 
| SUSE Linux Enterprise Server for SAP Applications 15 SP5 | kernel-default | Affected | 
| SUSE Linux Enterprise Server for SAP Applications 15 SP5 | kernel-source | Affected | 
| SUSE Manager Proxy 4.0 | kernel-source | Affected | 
| SUSE Manager Proxy 4.1 | kernel-source | Affected | 
| SUSE Manager Proxy 4.2 | kernel-source | Affected | 
| SUSE Manager Retail Branch Server 4.0 | kernel-source | Affected | 
| SUSE Manager Retail Branch Server 4.1 | kernel-source | Affected | 
| SUSE Manager Retail Branch Server 4.2 | kernel-source | Affected | 
| SUSE Manager Server 4.0 | kernel-source | Affected | 
| SUSE Manager Server 4.1 | kernel-source | Affected | 
| SUSE Manager Server 4.2 | kernel-source | Affected | 
| SUSE OpenStack Cloud 7 | kernel-source | Not affected | 
| SUSE OpenStack Cloud 9 | kernel-source | Affected | 
| SUSE OpenStack Cloud Crowbar 9 | kernel-source | Affected | 
| SUSE Real Time Module 15 SP3 | kernel-source-rt | Affected | 
| SUSE Real Time Module 15 SP4 | kernel-source-rt | Affected | 
| SUSE Real Time Module 15 SP5 | kernel-source-rt | Affected | 
| openSUSE Leap 15.3 | kernel-source | Affected | 
| openSUSE Leap 15.3 | kernel-source-rt | Affected | 
| openSUSE Leap 15.4 | kernel-source | Affected | 
| openSUSE Leap 15.4 | kernel-source-rt | Affected | 
| openSUSE Leap 15.5 | kernel-source | Affected | 
| openSUSE Leap 15.5 | kernel-source-rt | Affected | 
SUSE Timeline for this CVE
CVE page created: Thu Oct 30 12:00:27 2025CVE page last modified: Fri Oct 31 16:38:39 2025
