{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"important"},"category":"csaf_security_advisory","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"Security update for the Linux Kernel (Live Patch 6 for SLE 15 SP6)","title":"Title of the patch"},{"category":"description","text":"This update for the Linux Kernel 6.4.0-150600_23_30 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2025-21680: pktgen: Avoid out-of-bounds access in get_imix_entries (bsc#1236701).\n- CVE-2024-58013: Bluetooth: MGMT: Fix slab-use-after-free Read in mgmt_remove_adv_monitor_sync (bsc#1239096).\n- CVE-2024-57996: net_sched: sch_sfq: do not allow 1 packet limit (bsc#1239077).\n","title":"Description of the patch"},{"category":"details","text":"SUSE-2025-1944,SUSE-SLE-Module-Live-Patching-15-SP6-2025-1944","title":"Patchnames"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"SUSE ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"self","summary":"URL of this CSAF notice","url":"https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_01944-1.json"},{"category":"self","summary":"URL for SUSE-SU-2025:01944-1","url":"https://www.suse.com/support/update/announcement/2025/suse-su-202501944-1/"},{"category":"self","summary":"E-Mail link for SUSE-SU-2025:01944-1","url":"https://lists.suse.com/pipermail/sle-updates/2025-June/040278.html"},{"category":"self","summary":"SUSE Bug 1236701","url":"https://bugzilla.suse.com/1236701"},{"category":"self","summary":"SUSE Bug 1239077","url":"https://bugzilla.suse.com/1239077"},{"category":"self","summary":"SUSE Bug 1239096","url":"https://bugzilla.suse.com/1239096"},{"category":"self","summary":"SUSE CVE CVE-2024-57996 page","url":"https://www.suse.com/security/cve/CVE-2024-57996/"},{"category":"self","summary":"SUSE CVE CVE-2024-58013 page","url":"https://www.suse.com/security/cve/CVE-2024-58013/"},{"category":"self","summary":"SUSE CVE CVE-2025-21680 page","url":"https://www.suse.com/security/cve/CVE-2025-21680/"}],"title":"Security update for the Linux Kernel (Live Patch 6 for SLE 15 SP6)","tracking":{"current_release_date":"2025-06-13T10:04:01Z","generator":{"date":"2025-06-13T10:04:01Z","engine":{"name":"cve-database.git:bin/generate-csaf.pl","version":"1"}},"id":"SUSE-SU-2025:01944-1","initial_release_date":"2025-06-13T10:04:01Z","revision_history":[{"date":"2025-06-13T10:04:01Z","number":"1","summary":"Current version"}],"status":"final","version":"1"}},"product_tree":{"branches":[{"branches":[{"branches":[{"category":"product_version","name":"kernel-livepatch-6_4_0-150600_23_30-default-6-150600.2.2.ppc64le","product":{"name":"kernel-livepatch-6_4_0-150600_23_30-default-6-150600.2.2.ppc64le","product_id":"kernel-livepatch-6_4_0-150600_23_30-default-6-150600.2.2.ppc64le"}}],"category":"architecture","name":"ppc64le"},{"branches":[{"category":"product_version","name":"kernel-livepatch-6_4_0-150600_23_30-default-6-150600.2.2.s390x","product":{"name":"kernel-livepatch-6_4_0-150600_23_30-default-6-150600.2.2.s390x","product_id":"kernel-livepatch-6_4_0-150600_23_30-default-6-150600.2.2.s390x"}}],"category":"architecture","name":"s390x"},{"branches":[{"category":"product_version","name":"kernel-livepatch-6_4_0-150600_23_30-default-6-150600.2.2.x86_64","product":{"name":"kernel-livepatch-6_4_0-150600_23_30-default-6-150600.2.2.x86_64","product_id":"kernel-livepatch-6_4_0-150600_23_30-default-6-150600.2.2.x86_64"}}],"category":"architecture","name":"x86_64"},{"branches":[{"category":"product_name","name":"SUSE Linux Enterprise Live Patching 15 SP6","product":{"name":"SUSE Linux Enterprise Live Patching 15 SP6","product_id":"SUSE Linux Enterprise Live Patching 15 SP6","product_identification_helper":{"cpe":"cpe:/o:suse:sle-module-live-patching:15:sp6"}}}],"category":"product_family","name":"SUSE Linux Enterprise"}],"category":"vendor","name":"SUSE"}],"relationships":[{"category":"default_component_of","full_product_name":{"name":"kernel-livepatch-6_4_0-150600_23_30-default-6-150600.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP6","product_id":"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_30-default-6-150600.2.2.ppc64le"},"product_reference":"kernel-livepatch-6_4_0-150600_23_30-default-6-150600.2.2.ppc64le","relates_to_product_reference":"SUSE Linux Enterprise Live Patching 15 SP6"},{"category":"default_component_of","full_product_name":{"name":"kernel-livepatch-6_4_0-150600_23_30-default-6-150600.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP6","product_id":"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_30-default-6-150600.2.2.s390x"},"product_reference":"kernel-livepatch-6_4_0-150600_23_30-default-6-150600.2.2.s390x","relates_to_product_reference":"SUSE Linux Enterprise Live Patching 15 SP6"},{"category":"default_component_of","full_product_name":{"name":"kernel-livepatch-6_4_0-150600_23_30-default-6-150600.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP6","product_id":"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_30-default-6-150600.2.2.x86_64"},"product_reference":"kernel-livepatch-6_4_0-150600_23_30-default-6-150600.2.2.x86_64","relates_to_product_reference":"SUSE Linux Enterprise Live Patching 15 SP6"}]},"vulnerabilities":[{"cve":"CVE-2024-57996","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2024-57996"}],"notes":[{"category":"general","text":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet_sched: sch_sfq: don't allow 1 packet limit\n\nThe current implementation does not work correctly with a limit of\n1. iproute2 actually checks for this and this patch adds the check in\nkernel as well.\n\nThis fixes the following syzkaller reported crash:\n\nUBSAN: array-index-out-of-bounds in net/sched/sch_sfq.c:210:6\nindex 65535 is out of range for type 'struct sfq_head[128]'\nCPU: 0 PID: 2569 Comm: syz-executor101 Not tainted 5.10.0-smp-DEV #1\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024\nCall Trace:\n  __dump_stack lib/dump_stack.c:79 [inline]\n  dump_stack+0x125/0x19f lib/dump_stack.c:120\n  ubsan_epilogue lib/ubsan.c:148 [inline]\n  __ubsan_handle_out_of_bounds+0xed/0x120 lib/ubsan.c:347\n  sfq_link net/sched/sch_sfq.c:210 [inline]\n  sfq_dec+0x528/0x600 net/sched/sch_sfq.c:238\n  sfq_dequeue+0x39b/0x9d0 net/sched/sch_sfq.c:500\n  sfq_reset+0x13/0x50 net/sched/sch_sfq.c:525\n  qdisc_reset+0xfe/0x510 net/sched/sch_generic.c:1026\n  tbf_reset+0x3d/0x100 net/sched/sch_tbf.c:319\n  qdisc_reset+0xfe/0x510 net/sched/sch_generic.c:1026\n  dev_reset_queue+0x8c/0x140 net/sched/sch_generic.c:1296\n  netdev_for_each_tx_queue include/linux/netdevice.h:2350 [inline]\n  dev_deactivate_many+0x6dc/0xc20 net/sched/sch_generic.c:1362\n  __dev_close_many+0x214/0x350 net/core/dev.c:1468\n  dev_close_many+0x207/0x510 net/core/dev.c:1506\n  unregister_netdevice_many+0x40f/0x16b0 net/core/dev.c:10738\n  unregister_netdevice_queue+0x2be/0x310 net/core/dev.c:10695\n  unregister_netdevice include/linux/netdevice.h:2893 [inline]\n  __tun_detach+0x6b6/0x1600 drivers/net/tun.c:689\n  tun_detach drivers/net/tun.c:705 [inline]\n  tun_chr_close+0x104/0x1b0 drivers/net/tun.c:3640\n  __fput+0x203/0x840 fs/file_table.c:280\n  task_work_run+0x129/0x1b0 kernel/task_work.c:185\n  exit_task_work include/linux/task_work.h:33 [inline]\n  do_exit+0x5ce/0x2200 kernel/exit.c:931\n  do_group_exit+0x144/0x310 kernel/exit.c:1046\n  __do_sys_exit_group kernel/exit.c:1057 [inline]\n  __se_sys_exit_group kernel/exit.c:1055 [inline]\n  __x64_sys_exit_group+0x3b/0x40 kernel/exit.c:1055\n do_syscall_64+0x6c/0xd0\n entry_SYSCALL_64_after_hwframe+0x61/0xcb\nRIP: 0033:0x7fe5e7b52479\nCode: Unable to access opcode bytes at RIP 0x7fe5e7b5244f.\nRSP: 002b:00007ffd3c800398 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7\nRAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fe5e7b52479\nRDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000000\nRBP: 00007fe5e7bcd2d0 R08: ffffffffffffffb8 R09: 0000000000000014\nR10: 0000000000000000 R11: 0000000000000246 R12: 00007fe5e7bcd2d0\nR13: 0000000000000000 R14: 00007fe5e7bcdd20 R15: 00007fe5e7b24270\n\nThe crash can be also be reproduced with the following (with a tc\nrecompiled to allow for sfq limits of 1):\n\ntc qdisc add dev dummy0 handle 1: root tbf rate 1Kbit burst 100b lat 1s\n../iproute2-6.9.0/tc/tc qdisc add dev dummy0 handle 2: parent 1:10 sfq limit 1\nifconfig dummy0 up\nping -I dummy0 -f -c2 -W0.1 8.8.8.8\nsleep 1\n\nScenario that triggers the crash:\n\n* the first packet is sent and queued in TBF and SFQ; qdisc qlen is 1\n\n* TBF dequeues: it peeks from SFQ which moves the packet to the\n  gso_skb list and keeps qdisc qlen set to 1. TBF is out of tokens so\n  it schedules itself for later.\n\n* the second packet is sent and TBF tries to queues it to SFQ. qdisc\n  qlen is now 2 and because the SFQ limit is 1 the packet is dropped\n  by SFQ. At this point qlen is 1, and all of the SFQ slots are empty,\n  however q->tail is not NULL.\n\nAt this point, assuming no more packets are queued, when sch_dequeue\nruns again it will decrement the qlen for the current empty slot\ncausing an underflow and the subsequent out of bounds access.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_30-default-6-150600.2.2.ppc64le","SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_30-default-6-150600.2.2.s390x","SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_30-default-6-150600.2.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2024-57996","url":"https://www.suse.com/security/cve/CVE-2024-57996"},{"category":"external","summary":"SUSE Bug 1239076 for CVE-2024-57996","url":"https://bugzilla.suse.com/1239076"},{"category":"external","summary":"SUSE Bug 1239077 for CVE-2024-57996","url":"https://bugzilla.suse.com/1239077"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_30-default-6-150600.2.2.ppc64le","SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_30-default-6-150600.2.2.s390x","SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_30-default-6-150600.2.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":7.8,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"products":["SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_30-default-6-150600.2.2.ppc64le","SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_30-default-6-150600.2.2.s390x","SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_30-default-6-150600.2.2.x86_64"]}],"threats":[{"category":"impact","date":"2025-06-13T10:04:01Z","details":"important"}],"title":"CVE-2024-57996"},{"cve":"CVE-2024-58013","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2024-58013"}],"notes":[{"category":"general","text":"In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: MGMT: Fix slab-use-after-free Read in mgmt_remove_adv_monitor_sync\n\nThis fixes the following crash:\n\n==================================================================\nBUG: KASAN: slab-use-after-free in mgmt_remove_adv_monitor_sync+0x3a/0xd0 net/bluetooth/mgmt.c:5543\nRead of size 8 at addr ffff88814128f898 by task kworker/u9:4/5961\n\nCPU: 1 UID: 0 PID: 5961 Comm: kworker/u9:4 Not tainted 6.12.0-syzkaller-10684-gf1cd565ce577 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024\nWorkqueue: hci0 hci_cmd_sync_work\nCall Trace:\n <TASK>\n __dump_stack lib/dump_stack.c:94 [inline]\n dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:378 [inline]\n print_report+0x169/0x550 mm/kasan/report.c:489\n kasan_report+0x143/0x180 mm/kasan/report.c:602\n mgmt_remove_adv_monitor_sync+0x3a/0xd0 net/bluetooth/mgmt.c:5543\n hci_cmd_sync_work+0x22b/0x400 net/bluetooth/hci_sync.c:332\n process_one_work kernel/workqueue.c:3229 [inline]\n process_scheduled_works+0xa63/0x1850 kernel/workqueue.c:3310\n worker_thread+0x870/0xd30 kernel/workqueue.c:3391\n kthread+0x2f0/0x390 kernel/kthread.c:389\n ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147\n ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244\n </TASK>\n\nAllocated by task 16026:\n kasan_save_stack mm/kasan/common.c:47 [inline]\n kasan_save_track+0x3f/0x80 mm/kasan/common.c:68\n poison_kmalloc_redzone mm/kasan/common.c:377 [inline]\n __kasan_kmalloc+0x98/0xb0 mm/kasan/common.c:394\n kasan_kmalloc include/linux/kasan.h:260 [inline]\n __kmalloc_cache_noprof+0x243/0x390 mm/slub.c:4314\n kmalloc_noprof include/linux/slab.h:901 [inline]\n kzalloc_noprof include/linux/slab.h:1037 [inline]\n mgmt_pending_new+0x65/0x250 net/bluetooth/mgmt_util.c:269\n mgmt_pending_add+0x36/0x120 net/bluetooth/mgmt_util.c:296\n remove_adv_monitor+0x102/0x1b0 net/bluetooth/mgmt.c:5568\n hci_mgmt_cmd+0xc47/0x11d0 net/bluetooth/hci_sock.c:1712\n hci_sock_sendmsg+0x7b8/0x11c0 net/bluetooth/hci_sock.c:1832\n sock_sendmsg_nosec net/socket.c:711 [inline]\n __sock_sendmsg+0x221/0x270 net/socket.c:726\n sock_write_iter+0x2d7/0x3f0 net/socket.c:1147\n new_sync_write fs/read_write.c:586 [inline]\n vfs_write+0xaeb/0xd30 fs/read_write.c:679\n ksys_write+0x18f/0x2b0 fs/read_write.c:731\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nFreed by task 16022:\n kasan_save_stack mm/kasan/common.c:47 [inline]\n kasan_save_track+0x3f/0x80 mm/kasan/common.c:68\n kasan_save_free_info+0x40/0x50 mm/kasan/generic.c:582\n poison_slab_object mm/kasan/common.c:247 [inline]\n __kasan_slab_free+0x59/0x70 mm/kasan/common.c:264\n kasan_slab_free include/linux/kasan.h:233 [inline]\n slab_free_hook mm/slub.c:2338 [inline]\n slab_free mm/slub.c:4598 [inline]\n kfree+0x196/0x420 mm/slub.c:4746\n mgmt_pending_foreach+0xd1/0x130 net/bluetooth/mgmt_util.c:259\n __mgmt_power_off+0x183/0x430 net/bluetooth/mgmt.c:9550\n hci_dev_close_sync+0x6c4/0x11c0 net/bluetooth/hci_sync.c:5208\n hci_dev_do_close net/bluetooth/hci_core.c:483 [inline]\n hci_dev_close+0x112/0x210 net/bluetooth/hci_core.c:508\n sock_do_ioctl+0x158/0x460 net/socket.c:1209\n sock_ioctl+0x626/0x8e0 net/socket.c:1328\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:906 [inline]\n __se_sys_ioctl+0xf5/0x170 fs/ioctl.c:892\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_30-default-6-150600.2.2.ppc64le","SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_30-default-6-150600.2.2.s390x","SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_30-default-6-150600.2.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2024-58013","url":"https://www.suse.com/security/cve/CVE-2024-58013"},{"category":"external","summary":"SUSE Bug 1239095 for CVE-2024-58013","url":"https://bugzilla.suse.com/1239095"},{"category":"external","summary":"SUSE Bug 1239096 for CVE-2024-58013","url":"https://bugzilla.suse.com/1239096"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_30-default-6-150600.2.2.ppc64le","SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_30-default-6-150600.2.2.s390x","SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_30-default-6-150600.2.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":7.8,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"products":["SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_30-default-6-150600.2.2.ppc64le","SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_30-default-6-150600.2.2.s390x","SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_30-default-6-150600.2.2.x86_64"]}],"threats":[{"category":"impact","date":"2025-06-13T10:04:01Z","details":"important"}],"title":"CVE-2024-58013"},{"cve":"CVE-2025-21680","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2025-21680"}],"notes":[{"category":"general","text":"In the Linux kernel, the following vulnerability has been resolved:\n\npktgen: Avoid out-of-bounds access in get_imix_entries\n\nPassing a sufficient amount of imix entries leads to invalid access to the\npkt_dev->imix_entries array because of the incorrect boundary check.\n\nUBSAN: array-index-out-of-bounds in net/core/pktgen.c:874:24\nindex 20 is out of range for type 'imix_pkt [20]'\nCPU: 2 PID: 1210 Comm: bash Not tainted 6.10.0-rc1 #121\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996)\nCall Trace:\n<TASK>\ndump_stack_lvl lib/dump_stack.c:117\n__ubsan_handle_out_of_bounds lib/ubsan.c:429\nget_imix_entries net/core/pktgen.c:874\npktgen_if_write net/core/pktgen.c:1063\npde_write fs/proc/inode.c:334\nproc_reg_write fs/proc/inode.c:346\nvfs_write fs/read_write.c:593\nksys_write fs/read_write.c:644\ndo_syscall_64 arch/x86/entry/common.c:83\nentry_SYSCALL_64_after_hwframe arch/x86/entry/entry_64.S:130\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.\n\n[ fp: allow to fill the array completely; minor changelog cleanup ]","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_30-default-6-150600.2.2.ppc64le","SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_30-default-6-150600.2.2.s390x","SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_30-default-6-150600.2.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2025-21680","url":"https://www.suse.com/security/cve/CVE-2025-21680"},{"category":"external","summary":"SUSE Bug 1236700 for CVE-2025-21680","url":"https://bugzilla.suse.com/1236700"},{"category":"external","summary":"SUSE Bug 1236701 for CVE-2025-21680","url":"https://bugzilla.suse.com/1236701"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_30-default-6-150600.2.2.ppc64le","SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_30-default-6-150600.2.2.s390x","SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_30-default-6-150600.2.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":7.8,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"products":["SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_30-default-6-150600.2.2.ppc64le","SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_30-default-6-150600.2.2.s390x","SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_30-default-6-150600.2.2.x86_64"]}],"threats":[{"category":"impact","date":"2025-06-13T10:04:01Z","details":"important"}],"title":"CVE-2025-21680"}]}